<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://radar.offseq.com/</loc>
    <changefreq>hourly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats</loc>
    <changefreq>hourly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/map</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/feeds</loc>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?type=vulnerability</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?severity=critical</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?type=malware</loc>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7572-cwe-193-off-by-one-error-in-velocide-61856c3e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7572%3A%20CWE-193%3A%20Off-by-one%20Error%20in%20Velocidex%20velociraptor&amp;severity=medium&amp;id=69faacabcbff5d86108a9d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7573-cwe-639-authorization-bypass-through-f5fd5b87</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7573%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Velocidex%20velociraptor&amp;severity=medium&amp;id=69faacabcbff5d86108a9d3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-may-6th-2026-httpsiscs-bf4960a1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20May%206th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9920%2C%20(Wed%2C%20May%206th)&amp;severity=medium&amp;id=69faa21fcbff5d8610861a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71256-cwe-20-improper-input-validation-in-40ae3850</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71256%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69fa9ea6cbff5d86108492f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71255-cwe-20-improper-input-validation-in-f2bbb4e4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71255%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT610%2FT618%2FT7200%2FT7225%2FT7250%2FT7255%2FT7280%2FT7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69fa9ea6cbff5d86108492f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71254-cwe-20-improper-input-validation-in-b0ee8a0f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71254%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT610%2FT618%2FT7200%2FT7225%2FT7250%2FT7255%2FT7280%2FT7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69fa9ea6cbff5d86108492f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71253-cwe-20-improper-input-validation-in-417560ff</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71253%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT610%2FT618%2FT7200%2FT7225%2FT7250%2FT7255%2FT7280%2FT7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69fa9ea6cbff5d86108492ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71252-cwe-20-improper-input-validation-in-85185b24</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71252%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT610%2FT618%2FT7200%2FT7225%2FT7250%2FT7255%2FT7280%2FT7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69fa9ea6cbff5d86108492eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71251-cwe-20-improper-input-validation-in-54fe5172</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71251%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT610%2FT618%2FT7200%2FT7225%2FT7250%2FT7255%2FT7280%2FT7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69fa9ea6cbff5d86108492e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40934-cwe-613-insufficient-session-expira-b8f8a4d0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40934%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20jupyter-server%20jupyter_server&amp;severity=high&amp;id=69fa665ccbff5d861029ec75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28780-cwe-122-heap-based-buffer-overflow--058cea56</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28780%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=null&amp;id=69fa665ccbff5d861029ec69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40110-cwe-777-regular-expression-without--a76dd192</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40110%3A%20CWE-777%3A%20Regular%20Expression%20without%20Anchors%20in%20jupyter-server%20jupyter_server&amp;severity=high&amp;id=69fa665ccbff5d861029ec6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40075-cwe-22-improper-limitation-of-a-pat-680482b5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40075%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20openmrs%20openmrs-core&amp;severity=high&amp;id=69fa665ccbff5d861029ec6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39852-cwe-863-incorrect-authorization-in--c53262b4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39852%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20quarkusio%20quarkus&amp;severity=high&amp;id=69fa5fd1cbff5d8610282e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40068-cwe-20-improper-input-validation-in-8722f067</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40068%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69fa5fd1cbff5d8610282e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39849-cwe-93-improper-neutralization-of-c-dd4c8d44</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39849%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69fa5fd1cbff5d8610282e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41950-cwe-639-authorization-bypass-throug-03205f3b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41950%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20langgenius%20dify&amp;severity=medium&amp;id=69fa5868cbff5d861023d52b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35527-cwe-918-server-side-request-forgery-47ed0404</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35527%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lxc%20incus&amp;severity=medium&amp;id=69fa9bcdcbff5d86107d1b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35453-cwe-79-improper-neutralization-of-i-e7e50830</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35453%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PHPOffice%20PhpSpreadsheet&amp;severity=medium&amp;id=69fa4dc2cbff5d86102152b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35397-cwe-22-improper-limitation-of-a-pat-8fdf202b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35397%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jupyter-server%20jupyter_server&amp;severity=high&amp;id=69fa4dc2cbff5d86102152b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34596-cwe-367-time-of-check-time-of-use-t-b5be0b85</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34596%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20sandboxie-plus%20Sandboxie&amp;severity=medium&amp;id=69fa4dc2cbff5d86102152af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34527-cwe-328-use-of-weak-hash-in-sandbox-84c01739</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34527%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20sandboxie-plus%20Sandboxie&amp;severity=low&amp;id=69fa4dc2cbff5d86102152ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34464-cwe-121-stack-based-buffer-overflow-8336b64e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34464%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20sandboxie-plus%20Sandboxie&amp;severity=high&amp;id=69fa4dc2cbff5d86102152a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34462-cwe-121-stack-based-buffer-overflow-83b5669a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34462%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20sandboxie-plus%20Sandboxie&amp;severity=high&amp;id=69fa4dc2cbff5d86102152a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34461-cwe-121-stack-based-buffer-overflow-cbaf3951</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34461%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20sandboxie-plus%20Sandboxie&amp;severity=high&amp;id=69fa4dc2cbff5d86102152a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34459-cwe-121-stack-based-buffer-overflow-e970783b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34459%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20sandboxie-plus%20Sandboxie&amp;severity=high&amp;id=69fa4dc2cbff5d86102152a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34458-cwe-93-improper-neutralization-of-c-e575dfc0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34458%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20sandboxie-plus%20Sandboxie&amp;severity=critical&amp;id=69fa4dc2cbff5d861021529c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34084-cwe-502-deserialization-of-untruste-a9be2322</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34084%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PHPOffice%20PhpSpreadsheet&amp;severity=critical&amp;id=69fa46b8cbff5d86101fa002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33975-cwe-918-server-side-request-forgery-f4c98f9f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33975%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20twentyhq%20twenty&amp;severity=high&amp;id=69fa46b8cbff5d86101f9fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7857-buffer-overflow-in-d-link-di-8100-752fdf23</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7857%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=69fa46b8cbff5d86101fa00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33420-cwe-862-missing-authorization-in-da-56f34993</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33420%3A%20CWE-862%3A%20Missing%20Authorization%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=69fa46b8cbff5d86101f9ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33324-cwe-89-improper-neutralization-of-s-5605c7fd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33324%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dataease%20SQLBot&amp;severity=critical&amp;id=69fa46b8cbff5d86101f9ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32699-cwe-472-external-control-of-assumed-db8e4799</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32699%3A%20CWE-472%3A%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20NeoRazorX%20facturascripts&amp;severity=medium&amp;id=69fa46b8cbff5d86101f9ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7856-buffer-overflow-in-d-link-di-8100-2f03750b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7856%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=69fa46b8cbff5d86101fa005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32603-cwe-20-improper-input-validation-in-54c35d14</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32603%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20sandboxie-plus%20Sandboxie&amp;severity=high&amp;id=69fa46b8cbff5d86101f9ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31835-cwe-345-insufficient-verification-o-1afaaee1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31835%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=69fa3fb2cbff5d86101cd316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30923-cwe-125-out-of-bounds-read-in-owasp-7f589759</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30923%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20owasp-modsecurity%20ModSecurity&amp;severity=high&amp;id=69fa3fb2cbff5d86101cd312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27960-cwe-287-improper-authentication-in--0f5e78f0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27960%3A%20CWE-287%3A%20Improper%20Authentication%20in%20OpenCTI-Platform%20opencti&amp;severity=critical&amp;id=69fa3fb2cbff5d86101cd30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7855-buffer-overflow-in-d-link-di-8100-4d0ad888</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7855%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=69fa3fb2cbff5d86101cd31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7854-buffer-overflow-in-d-link-di-8100-87d0fee7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7854%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=critical&amp;id=69fa3543cbff5d8610191210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7853-buffer-overflow-in-d-link-di-8100-d6444c63</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7853%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=critical&amp;id=69fa2e1dcbff5d8610171ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7851-stack-based-buffer-overflow-in-d-lin-a0d5d253</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7851%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=69fa2e1dcbff5d8610171ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7847-insufficiently-random-values-in-chat-89f9045b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7847%3A%20Insufficiently%20Random%20Values%20in%20chatchat-space%20Langchain-Chatchat&amp;severity=low&amp;id=69fa200ecbff5d861012a7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7846-time-of-check-time-of-use-in-chatcha-d7e27c04</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7846%3A%20Time-of-check%20Time-of-use%20in%20chatchat-space%20Langchain-Chatchat&amp;severity=low&amp;id=69fa1920cbff5d86100ff74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7845-use-of-weak-hash-in-chatchat-space-l-fa129d47</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7845%3A%20Use%20of%20Weak%20Hash%20in%20chatchat-space%20Langchain-Chatchat&amp;severity=low&amp;id=69fa1920cbff5d86100ff746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34956-buffer-copy-without-checking-size-o-88a9c25e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34956%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Red%20Hat%20Fast%20Datapath%20for%20RHEL%207&amp;severity=medium&amp;id=69fa191dcbff5d86100ff6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61669-cwe-601-url-redirection-to-untruste-fca3a190</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61669%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20jupyter-server%20jupyter_server&amp;severity=medium&amp;id=69fa191dcbff5d86100ff6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32689-cwe-770-allocation-of-resources-wit-1f4b11ef</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32689%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20phoenixframework%20phoenix&amp;severity=high&amp;id=69fa191dcbff5d86100ff6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7865-cwe-88-improper-neutralization-of-ar-27659533</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7865%3A%20CWE-88%20Improper%20neutralization%20of%20argument%20delimiters%20in%20a%20command%20(&apos;argument%20injection&apos;)%20in%20Crestron%20Electronics%20Touchpanels%20(x60%2Fx70)&amp;severity=high&amp;id=69fa1920cbff5d86100ff756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7844-missing-authentication-in-chatchat-s-46311591</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7844%3A%20Missing%20Authentication%20in%20chatchat-space%20Langchain-Chatchat&amp;severity=medium&amp;id=69fa1920cbff5d86100ff73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35192-cwe-539-use-of-persistent-cookies-c-621b271d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35192%3A%20CWE-539%3A%20Use%20of%20Persistent%20Cookies%20Containing%20Sensitive%20Information%20in%20djangoproject%20Django&amp;severity=low&amp;id=69fa191dcbff5d86100ff6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6907-cwe-524-use-of-cache-containing-sens-82a90fd0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6907%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69fa1920cbff5d86100ff731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5766-cwe-130-improper-handling-of-length--ee97972f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5766%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69fa1920cbff5d86100ff72c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-sophisticated-phishing-campaign-06ad8e79</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20of%20Sophisticated%20Phishing%20Campaign%20Targeting%20US%20Organizations&amp;severity=medium&amp;id=69fa03ebcbff5d861005e037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34002-buffer-access-with-incorrect-length-7949bca9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34002%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69fa191dcbff5d86100ff6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34000-out-of-bounds-read-in-red-hat-red-h-8d00ecce</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34000%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69fa191dcbff5d86100ff6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cleartext-passwords-in-ms-edgex3f-in-2026x3f-mon-m-b18de1ed</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cleartext%20Passwords%20in%20MS%20Edge%26%23x3f%3B%20In%202026%26%23x3f%3B%2C%20(Mon%2C%20May%204th)&amp;severity=medium&amp;id=69f9d9bdcbff5d8610f3bb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-published-versions-of-a-fake-tanstack-package-6040cebc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20published%20versions%20of%20a%20fake%20%22tanstack%22%20package%20uploaded%20in%2027%20minutes%20that%20want%20to%20steal%20your%20.env%20files&amp;severity=medium&amp;id=69fa1914cbff5d86100ff335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/popular-daemon-tools-software-compromised-687cfee5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Popular%20DAEMON%20Tools%20software%20compromised&amp;severity=medium&amp;id=69fa157fcbff5d86100eace9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7412-cwe-918-server-side-request-forgery--91ae3be6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7412%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20Eclipse%20Foundation%20Eclipse%20BaSyx&amp;severity=high&amp;id=69fa1920cbff5d86100ff73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7411-cwe-22-improper-limitation-of-a-path-f3bc36dd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7411%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20Eclipse%20Foundation%20Eclipse%20BaSyx&amp;severity=critical&amp;id=69fa1920cbff5d86100ff736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudz-rat-potentially-steals-otp-messages-using-p-18f1cb83</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CloudZ%20RAT%20potentially%20steals%20OTP%20messages%20using%20Pheno%20plugin&amp;severity=medium&amp;id=69fa157fcbff5d86100ead00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7834-stack-based-buffer-overflow-in-efm-i-b78d64ff</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7834%3A%20Stack-based%20Buffer%20Overflow%20in%20EFM%20ipTIME%20NAS1dual&amp;severity=critical&amp;id=69fa1923cbff5d86100ff7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7778-cwe-269-improper-privilege-managemen-0eb950a7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7778%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20runZero%20Platform&amp;severity=medium&amp;id=69fa1923cbff5d86100ff7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-conversations-joey-melo-on-hacking-ai-7bac1f32</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Conversations%3A%20Joey%20Melo%20on%20Hacking%20AI&amp;severity=medium&amp;id=69f9f256cbff5d8610fd9071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4304-cwe-89-improper-neutralization-of-sp-bfc98dac</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4304%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WeePie%20WeePie%20Cookie%20Allow&amp;severity=high&amp;id=69fa1923cbff5d86100ff7d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29168-cwe-770-allocation-of-resources-wit-a3d12556</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29168%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=69fa1920cbff5d86100ff75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30246-cwe-436-interpretation-conflict-in--0ff19936</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30246%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20gofiber%20fiber&amp;severity=medium&amp;id=69f9e7ebcbff5d8610f9a671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-bug-could-expose-300000-ollama-deployment-71fdb1e2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Bug%20Could%20Expose%20300%2C000%20Ollama%20Deployments%20to%20Information%20Theft&amp;severity=critical&amp;id=69f9e7cacbff5d8610f9990f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7833-command-injection-in-efm-iptime-c200-dfaa75c0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7833%3A%20Command%20Injection%20in%20EFM%20ipTIME%20C200&amp;severity=high&amp;id=69f9e7ebcbff5d8610f9a680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6918-cwe-125-out-of-bounds-read-in-eclips-b37215f5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6918%3A%20CWE-125%20Out-of-bounds%20read%20in%20Eclipse%20Foundation%20Eclipse%20OpenJ9&amp;severity=high&amp;id=69f9e7ebcbff5d8610f9a676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7832-symlink-following-in-iobit-advanced--cb975679</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7832%3A%20Symlink%20Following%20in%20IObit%20Advanced%20SystemCare&amp;severity=high&amp;id=69f9e7ebcbff5d8610f9a67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-via-daemon-tools-kaspersky-off-5a1480a1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20chain%20attack%20via%20DAEMON%20Tools%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69f9e14acbff5d8610f6972f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-remote-code-execution-vulnerability-patch-d0aaec0b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Remote%20Code%20Execution%20Vulnerability%20Patched%20in%20Android&amp;severity=critical&amp;id=69f9dd3fcbff5d8610f4f894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sslcom-rotates-their-root-certificate-today-tue-ma-4b10d4b6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SSL.com%20rotates%20their%20root%20certificate%20today%2C%20(Tue%2C%20May%205th)&amp;severity=medium&amp;id=69f9d638cbff5d8610f230c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6261-cwe-434-unrestricted-upload-of-file--e0e5cbaf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6261%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20MuffinGroup%20Betheme&amp;severity=high&amp;id=69f9d9cccbff5d8610f3c08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6262-cwe-22-improper-limitation-of-a-path-b585f58c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6262%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MuffinGroup%20Betheme&amp;severity=medium&amp;id=69f9d9cccbff5d8610f3c091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-high-severity-vulnerabilities-patched-in--0de059ec</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%2C%20High-Severity%20Vulnerabilities%20Patched%20in%20Apache%20MINA%2C%20HTTP%20Server&amp;severity=critical&amp;id=69f9d2d5cbff5d8610f051ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42611-cwe-295-improper-certificate-valida-8987fbe9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42611%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Mikrotik%20RouterOS&amp;severity=medium&amp;id=69f9d2e5cbff5d8610f0c7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/karakurt-ransomware-negotiator-sentenced-to-prison-2e077b51</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Karakurt%20Ransomware%20Negotiator%20Sentenced%20to%20Prison&amp;severity=medium&amp;id=69f9cf2ecbff5d8610ee2861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-rigged-game-compromises-gaming-platform-in-a-sup-f8a8d246</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20rigged%20game%3A%20compromises%20gaming%20platform%20in%20a%20supply-chain%20attack&amp;severity=medium&amp;id=69f9c827cbff5d8610eb4b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/metinfo-weaver-e-cology-vulnerabilities-in-attacke-a123bea3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MetInfo%2C%20Weaver%20E-cology%20Vulnerabilities%20in%20Attackers%E2%80%99%20Crosshairs&amp;severity=low&amp;id=69f9ba16cbff5d8610e53c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-discloses-file-spoofing-arbitrary-url-sch-27ffead3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Discloses%20File%20Spoofing%2C%20Arbitrary%20URL%20Scheme%20Vulnerabilities&amp;severity=medium&amp;id=69f9b30ecbff5d8610e1246e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3601-cwe-862-missing-authorization-in-wpe-7038cf22</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3601%3A%20CWE-862%20Missing%20Authorization%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69f9ac07cbff5d8610dd1b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-43868-cwe-789-memory-allocation-with-exce-6136ad99</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-43868%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=medium&amp;id=69f9ac07cbff5d8610dd1b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-43870-cwe-346-origin-validation-error-in--c880d4c5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-43870%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=null&amp;id=69f9ac07cbff5d8610dd1b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3359-cwe-89-improper-neutralization-of-sp-33120d7c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3359%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=69f9ac07cbff5d8610dd1b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-43869-cwe-297-improper-validation-of-cert-ad66b90a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-43869%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=null&amp;id=69f9a181cbff5d8610d825a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40797-cwe-89-improper-neutralization-of-s-1958ecd4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40797%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Saleswonder%20LLC%20WebinarIgnition&amp;severity=critical&amp;id=69f996efcbff5d8610d1971f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5192-cwe-22-improper-limitation-of-a-path-a9dd1409</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5192%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=69f996efcbff5d8610d19722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2729-cwe-639-authorization-bypass-through-d690fefb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2729%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=69f996efcbff5d8610d19711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3454-cwe-639-authorization-bypass-through-87bc57e6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3454%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20edge22%20GenerateBlocks&amp;severity=medium&amp;id=69f996efcbff5d8610d19715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7824-cwe-532-insertion-of-sensitive-infor-fd5428f5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7824%3A%20CWE-532%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20PaperCut%20PaperCut%20Hive&amp;severity=medium&amp;id=69f996efcbff5d8610d1972c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6418-cwe-36-absolute-path-traversal-in-pa-5ae7b340</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6418%3A%20CWE-36%20Absolute%20path%20traversal%20in%20PaperCut%20PaperCut%20NG%2FMF&amp;severity=medium&amp;id=69f996efcbff5d8610d19729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6180-cwe-367-time-of-check-time-of-use-to-3c019815</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6180%3A%20CWE-367%20Time-of-check%20time-of-use%20(TOCTOU)%20race%20condition%20in%20PaperCut%20PaperCut%20NG%2FMF&amp;severity=medium&amp;id=69f996efcbff5d8610d19726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7823-os-command-injection-in-totolink-a80-8f67ff3e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7823%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f97ad1cbff5d8610ab99f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7822-sql-injection-in-itsourcecode-courie-b3514c0d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7822%3A%20SQL%20Injection%20in%20itsourcecode%20Courier%20Management%20System&amp;severity=medium&amp;id=69f97ad1cbff5d8610ab99ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4362-cwe-862-missing-authorization-in-rox-b06c1e3c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4362%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69f97ad1cbff5d8610ab99d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7812-command-injection-in-54yyyu-code-mcp-4ca9800b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7812%3A%20Command%20Injection%20in%2054yyyu%20code-mcp&amp;severity=medium&amp;id=69f97ad1cbff5d8610ab99e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7811-path-traversal-in-54yyyu-code-mcp-a3e9abb7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7811%3A%20Path%20Traversal%20in%2054yyyu%20code-mcp&amp;severity=medium&amp;id=69f97ad1cbff5d8610ab99dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7810-path-traversal-in-usamak98-python-no-bd6eba3e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7810%3A%20Path%20Traversal%20in%20UsamaK98%20python-notebook-mcp&amp;severity=medium&amp;id=69f96cc0cbff5d86109c392e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5159-cwe-79-improper-neutralization-of-in-07a2e1a2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5159%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69f96cc0cbff5d86109c3914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4665-cwe-79-improper-neutralization-of-in-528775b6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4665%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shapedplugin%20Carousel%2C%20Slider%2C%20Photo%20Gallery%20with%20Lightbox%2C%20Video%20Slider%2C%20by%20WP%20Carousel&amp;severity=medium&amp;id=69f96cc0cbff5d86109c3906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4803-cwe-79-improper-neutralization-of-in-161d7e5b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4803%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=high&amp;id=69f96cc0cbff5d86109c390c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5957-cwe-22-improper-limitation-of-a-path-3a6fdea1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5957%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20roxnor%20EmailKit%20%E2%80%93%20Email%20Customizer%20for%20WooCommerce%20%26%20WP&amp;severity=medium&amp;id=69f96cc0cbff5d86109c3922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2948-cwe-918-server-side-request-forgery--693a12a6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2948%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jegstudio%20Gutenverse%20%E2%80%93%20Ultimate%20WordPress%20FSE%20Blocks%20Addons%20%26%20Ecosystem&amp;severity=medium&amp;id=69f96cc0cbff5d86109c38fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5294-cwe-862-missing-authorization-in-ahm-a69c64e2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5294%3A%20CWE-862%20Missing%20Authorization%20in%20ahmadgb%20GeekyBot%20%E2%80%94%20AI%20Copilot%2C%20Chatbot%2C%20WooCommerce%20Lead%20Gen%20%26%20Zero-Prompt%20Content&amp;severity=critical&amp;id=69f96cc0cbff5d86109c391e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3456-cwe-89-improper-neutralization-of-sp-eb447b53</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3456%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ahmadgb%20GeekyBot%20%E2%80%94%20AI%20Copilot%2C%20Chatbot%2C%20WooCommerce%20Lead%20Gen%20%26%20Zero-Prompt%20Content&amp;severity=high&amp;id=69f96cc0cbff5d86109c3902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35228-vulnerability-in-the-oracle-mcp-ser-82197044</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35228%3A%20Vulnerability%20in%20the%20Oracle%20MCP%20Server%20Helper%20Tool%20product%20of%20Oracle%20Open%20Source%20Projects%20(component%3A%20helper%20tool).%20The%20supported%20versions%20that%20is%20affected%20is%201.0.1-1.0.156.%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20MCP%20Server%20Helper%20Tool.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20Oracle%20MCP%20Server%20Helper%20Tool%20executing%20malicious%20SQL.%20in%20Oracle%20Corporation%20Oracle%20MCP%20Server%20Helper%20Tool%20product%20of%20Oracle%20Open%20Source%20Projects&amp;severity=high&amp;id=69f96cc0cbff5d86109c38ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1921-cwe-22-improper-limitation-of-a-path-4e4857f5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1921%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20timwhitlock%20Loco%20Translate&amp;severity=medium&amp;id=69f95b2ccbff5d861087955a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5505-cwe-79-improper-neutralization-of-in-d7cbfeb9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitacre%20WP-Clippy&amp;severity=medium&amp;id=69f95b2ccbff5d861087958e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6255-cwe-79-improper-neutralization-of-in-92b80712</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6255%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sszdh%20Simple%20Owl%20Shortcodes&amp;severity=medium&amp;id=69f95b2ccbff5d8610879595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6704-cwe-79-improper-neutralization-of-in-a37d69b4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phpsandeepkumar%20Blog%20Settings&amp;severity=medium&amp;id=69f95b30cbff5d86108796dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2868-cwe-79-improper-neutralization-of-in-e46c8539</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20%E2%80%93%20Ultimate%20WordPress%20FSE%20Blocks%20Addons%20%26%20Ecosystem&amp;severity=medium&amp;id=69f95b2ccbff5d8610879563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6702-cwe-352-cross-site-request-forgery-c-5327ab0b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6702%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20foux%20Publish%202%20Ping.fm&amp;severity=medium&amp;id=69f95b30cbff5d86108796d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6700-cwe-352-cross-site-request-forgery-c-183ed13d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6700%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xavortm%20DX%20Sources&amp;severity=medium&amp;id=69f95b30cbff5d86108796c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5247-cwe-79-improper-neutralization-of-in-1779307a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5247%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20publishpress%20Schedule%20Post%20Changes%20With%20PublishPress%20Future%3A%20Unpublish%2C%20Delete%2C%20Change%20Status%2C%20Trash%2C%20Change%20Categories&amp;severity=medium&amp;id=69f95b2ccbff5d8610879588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4409-cwe-200-exposure-of-sensitive-inform-9fa5cfef</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4409%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpkube%20Subscribe%20To%20Comments%20Reloaded&amp;severity=medium&amp;id=69f95b2ccbff5d8610879567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5100-cwe-89-improper-neutralization-of-sp-611e98b0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5100%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20strategy11team%20AWP%20Classifieds&amp;severity=high&amp;id=69f95b2ccbff5d8610879573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13618-cwe-269-improper-privilege-manageme-6abc563f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13618%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dreamstechnologies%20Mentoring&amp;severity=critical&amp;id=69f95b2ccbff5d8610879555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6696-cwe-79-improper-neutralization-of-in-7f28ecdc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zingaya%20Zingaya%20Click-to-Call&amp;severity=medium&amp;id=69f95b2ccbff5d861087959a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4730-cwe-79-improper-neutralization-of-in-dd11877f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4730%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20commonninja%20Charts%20Ninja%3A%20Create%20Beautiful%20Graphs%20%26%20Charts%20and%20Easily%20Add%20Them%20to%20Your%20Website&amp;severity=medium&amp;id=69f95b2ccbff5d861087956d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6701-cwe-352-cross-site-request-forgery-c-0c4f3669</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6701%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kazunii%20addfreespace&amp;severity=medium&amp;id=69f95b30cbff5d86108796c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-may-5th-2026-httpsiscsan-6ac1acac</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20May%205th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9918%2C%20(Tue%2C%20May%205th)&amp;severity=medium&amp;id=69f9509fcbff5d86107fffaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5722-cwe-287-improper-authentication-in-m-b66ead43</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5722%3A%20CWE-287%20Improper%20Authentication%20in%20MoreConvert%20MoreConvert%20Pro&amp;severity=critical&amp;id=69f950a6cbff5d8610800192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-44029-cwe-36-absolute-path-traversal-in-n-a367ef23</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-44029%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20NixOS%20Nix&amp;severity=medium&amp;id=69f94292cbff5d86107871db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-44028-cwe-674-uncontrolled-recursion-in-n-287802e5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-44028%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20NixOS%20Nix&amp;severity=high&amp;id=69f94292cbff5d86107871d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7788-path-traversal-in-axle-bucamp-mcp-do-1ff2691c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7788%3A%20Path%20Traversal%20in%20Axle-Bucamp%20MCP-Docusaurus&amp;severity=medium&amp;id=69f9347fcbff5d86105865b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34408-na-ceb7d40e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34408%3A%20n%2Fa&amp;severity=high&amp;id=69fa9bcdcbff5d86107d1b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-05-05-6b71e096</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-05-05&amp;severity=medium&amp;id=69fa85f6cbff5d861031e237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38947-na-88fad7df</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38947%3A%20n%2Fa&amp;severity=null&amp;id=69fa4dc6cbff5d86102156fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52911-na-31a21698</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52911%3A%20n%2Fa&amp;severity=null&amp;id=69fa4dc2cbff5d8610215297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42997-cwe-669-incorrect-resource-transfer-b76f25a2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42997%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20OpenStack%20Ironic&amp;severity=high&amp;id=69fa3543cbff5d861019120d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38428-na-dd5d21e2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38428%3A%20n%2Fa&amp;severity=null&amp;id=69fa3543cbff5d8610191209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36356-na-f6f24fa6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36356%3A%20n%2Fa&amp;severity=critical&amp;id=69fa2e1dcbff5d8610171cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36355-na-17e94d8e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36355%3A%20n%2Fa&amp;severity=high&amp;id=69fa2e1dcbff5d8610171cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-43002-cwe-696-incorrect-behavior-order-in-720467b7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-43002%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20OpenStack%20Horizon&amp;severity=medium&amp;id=69fa200ecbff5d861012a7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38432-na-a1e4be04</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38432%3A%20n%2Fa&amp;severity=null&amp;id=69fa200ecbff5d861012a7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38431-na-1bdd924d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38431%3A%20n%2Fa&amp;severity=null&amp;id=69fa200ecbff5d861012a7b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38429-na-3b13fcc9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38429%3A%20n%2Fa&amp;severity=null&amp;id=69fa200ecbff5d861012a7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39103-na-e2ca7718</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39103%3A%20n%2Fa&amp;severity=null&amp;id=69fa1920cbff5d86100ff727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31196-na-a065a0b2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31196%3A%20n%2Fa&amp;severity=null&amp;id=69fa191dcbff5d86100ff6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31195-na-a0a312e1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31195%3A%20n%2Fa&amp;severity=null&amp;id=69fa191dcbff5d86100ff6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66369-na-faa1032b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66369%3A%20n%2Fa&amp;severity=null&amp;id=69fa191dcbff5d86100ff6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52206-na-a84d334c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52206%3A%20n%2Fa&amp;severity=medium&amp;id=69fa191dcbff5d86100ff6ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-05-05-c4bd90bd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-05-05&amp;severity=low&amp;id=69f98fdfcbff5d8610cc0abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lorem-ipsum-malware-trojanized-ms-teams-installers-4764595c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lorem%20Ipsum%20Malware%3A%20Trojanized%20MS%20Teams%20Installers&amp;severity=medium&amp;id=69f9c4e6cbff5d8610ea2fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7785-os-command-injection-in-a-g-u-p-t-a--55700c28</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7785%3A%20OS%20Command%20Injection%20in%20A-G-U-P-T-A%20wireshark-mcp&amp;severity=medium&amp;id=69f9347fcbff5d86105865a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7784-path-traversal-in-rtgs2017-nagaagent-94e1551d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7784%3A%20Path%20Traversal%20in%20RTGS2017%20NagaAgent&amp;severity=medium&amp;id=69f930fccbff5d8610577adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7783-sql-injection-in-codecanyon-perfex-c-db6084b5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7783%3A%20SQL%20Injection%20in%20CodeCanyon%20Perfex%20CRM&amp;severity=medium&amp;id=69f92a2bcbff5d8610556600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7782-authorization-bypass-in-codecanyon-p-050b8720</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7782%3A%20Authorization%20Bypass%20in%20CodeCanyon%20Perfex%20CRM&amp;severity=medium&amp;id=69f91f69cbff5d8610524b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7781-denial-of-service-in-open5gs-3743eacc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7781%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f91f69cbff5d8610524b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7791-cwe-367-time-of-check-time-of-use-to-15817735</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7791%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Amazon%20Workspaces&amp;severity=high&amp;id=69f91c23cbff5d8610512c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7780-denial-of-service-in-open5gs-bd9ed1b8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7780%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f91c23cbff5d8610512c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7776-cwe-770-allocation-of-resources-with-ae4227cc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7776%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Boundary&amp;severity=high&amp;id=69f914f1cbff5d86104e7376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7779-denial-of-service-in-open5gs-6e8b7078</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7779%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f90a5bcbff5d86104a42a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42238-cwe-94-improper-control-of-generati-88b6fe8d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42238%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69f90348cbff5d8610482e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42223-cwe-200-exposure-of-sensitive-infor-2f7a8355</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42223%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69f90348cbff5d8610482e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42222-cwe-306-missing-authentication-for--c5e252fc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42222%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69f90348cbff5d8610482e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42221-cwe-306-missing-authentication-for--8c6dba59</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42221%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69f90348cbff5d8610482e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42220-cwe-200-exposure-of-sensitive-infor-53312fab</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42220%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69f90348cbff5d8610482e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41927-cwe-121-stack-based-buffer-overflow-bebd879a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41927%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Shenzhen%20Yipu%20Commercial%20and%20Trading%20Co.%2C%20Ltd%20WDR201A%20WiFi%20Extender&amp;severity=high&amp;id=69f8fc41cbff5d8610463c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41926-improper-neutralization-of-special--58e4d954</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41926%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Shenzhen%20Yipu%20Commercial%20and%20Trading%20Co.%2C%20Ltd%20WDR201A%20WiFi%20Extender&amp;severity=critical&amp;id=69f8f1b7cbff5d861042a3a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41925-improper-neutralization-of-special--d33e9e36</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41925%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Shenzhen%20Yipu%20Commercial%20and%20Trading%20Co.%2C%20Ltd%20WDR201A%20WiFi%20Extender&amp;severity=critical&amp;id=69f8f1b7cbff5d861042a39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41924-improper-neutralization-of-special--62b0b2d6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41924%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Shenzhen%20Yipu%20Commercial%20and%20Trading%20Co.%2C%20Ltd%20WDR201A%20WiFi%20Extender&amp;severity=critical&amp;id=69f8f1b7cbff5d861042a398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41923-improper-neutralization-of-special--484be04b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41923%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Shenzhen%20Yipu%20Commercial%20and%20Trading%20Co.%2C%20Ltd%20WDR201A%20WiFi%20Extender&amp;severity=critical&amp;id=69f8f1b7cbff5d861042a393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41922-improper-neutralization-of-special--5f2de19a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41922%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Shenzhen%20Yipu%20Commercial%20and%20Trading%20Co.%2C%20Ltd%20WDR201A%20WiFi%20Extender&amp;severity=critical&amp;id=69f8f1b7cbff5d861042a38e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-moves-to-acquire-astrix-security-to-tackle-n-8273e26e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Moves%20to%20Acquire%20Astrix%20Security%20to%20Tackle%20Non-Human%20Identity%20Risks&amp;severity=medium&amp;id=69f8ee32cbff5d861041c1fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41686-cwe-732-incorrect-permission-assign-c1f12890</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41686%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20anthropics%20anthropic-sdk-typescript&amp;severity=medium&amp;id=69f8eaaecbff5d8610415ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42237-cwe-89-improper-neutralization-of-s-5f1f0fbf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42237%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69f8eab1cbff5d8610415b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42236-cwe-770-allocation-of-resources-wit-9e084650</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42236%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69f8eab1cbff5d8610415b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42235-cwe-87-improper-neutralization-of-a-a8f3c14f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42235%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69f8eab1cbff5d8610415b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42234-cwe-94-improper-control-of-generati-0e284869</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42234%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69f8eab1cbff5d8610415b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42233-cwe-89-improper-neutralization-of-s-2ef4fac1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42233%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69f8eab1cbff5d8610415b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42232-cwe-1321-improperly-controlled-modi-06110295</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42232%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69f8eaaecbff5d8610415aff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42231-cwe-1321-improperly-controlled-modi-f01313f1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42231%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69f8eaaecbff5d8610415afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25863-cwe-1284-improper-validation-of-spe-91504cf9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25863%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Jules%20Colle%20Conditional%20Fields%20for%20Contact%20Form%207&amp;severity=high&amp;id=69f8eaaecbff5d8610415ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42230-cwe-601-url-redirection-to-untruste-b1767f4a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42230%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69f8eaaecbff5d8610415af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42229-cwe-89-improper-neutralization-of-s-4c52c27a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42229%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69f8eaaecbff5d8610415af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42228-cwe-862-missing-authorization-in-n8-6dd2c1bb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42228%3A%20CWE-862%3A%20Missing%20Authorization%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69f8eaaecbff5d8610415af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42227-cwe-639-authorization-bypass-throug-09bdb1ec</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42227%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69f8eaaecbff5d8610415af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42226-cwe-862-missing-authorization-in-n8-215fa616</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42226%3A%20CWE-862%3A%20Missing%20Authorization%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69f8eaaecbff5d8610415aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29004-cwe-122-heap-based-buffer-overflow--38725a50</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29004%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20vda-linux%20busybox_mirror&amp;severity=high&amp;id=69f8e3e0cbff5d86103e4653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0073-remote-code-execution-in-google-andr-18b1c8cd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0073%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=69f8e3e0cbff5d86103e4650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42146-cwe-789-memory-allocation-with-exce-e84aafbb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42146%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20GreycLab%20CImg&amp;severity=medium&amp;id=69f8e3e0cbff5d86103e4669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42144-cwe-190-integer-overflow-or-wraparo-ea964b5e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42144%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GreycLab%20CImg&amp;severity=medium&amp;id=69f8e3e0cbff5d86103e4663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41572-cwe-285-improper-authorization-in-e-0231c7cf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41572%3A%20CWE-285%3A%20Improper%20Authorization%20in%20enchant97%20note-mark&amp;severity=medium&amp;id=69f8e3e0cbff5d86103e465f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41571-cwe-287-improper-authentication-in--e2dae50b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41571%3A%20CWE-287%3A%20Improper%20Authentication%20in%20enchant97%20note-mark&amp;severity=critical&amp;id=69f8e3e0cbff5d86103e465b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41471-cwe-639-authorization-bypass-throug-2d7a3288</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41471%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Scott%20Paterson%20easy-paypal-events-tickets&amp;severity=high&amp;id=69f8dc9fcbff5d86103c00f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32834-cwe-798-use-of-hard-coded-credentia-d13dc520</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32834%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Scott%20Paterson%20easy-paypal-events-tickets&amp;severity=high&amp;id=69f8dc9fcbff5d86103c00e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42140-cwe-918-server-side-request-forgery-aa962164</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42140%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20xwiki-contrib%20macro-plantuml&amp;severity=medium&amp;id=69f8dca1cbff5d86103c0143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42138-cwe-79-improper-neutralization-of-i-1248f091</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42138%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=medium&amp;id=69f8dca1cbff5d86103c013f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-43616-cwe-23-relative-path-traversal-in-h-ddbc1a14</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-43616%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20horsicq%20DIE-engine&amp;severity=medium&amp;id=69f8dca1cbff5d86103c0148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42092-cwe-200-exposure-of-sensitive-infor-14a12ed2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42092%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20titraio%20titra&amp;severity=medium&amp;id=69f8dca1cbff5d86103c013c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42091-cwe-352-cross-site-request-forgery--9c62eaee</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42091%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20patrickhener%20goshs&amp;severity=medium&amp;id=69f8dc9fcbff5d86103c0114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trellix-source-code-repository-breached-dd11809c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trellix%20Source%20Code%20Repository%20Breached&amp;severity=medium&amp;id=69f8d916cbff5d86103b32b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42088-cwe-250-execution-with-unnecessary--d816621b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42088%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20OpenC3%20cosmos&amp;severity=critical&amp;id=69f8dc9fcbff5d86103c010f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42087-cwe-89-improper-neutralization-of-s-e604da8a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42087%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20OpenC3%20cosmos&amp;severity=critical&amp;id=69f8dc9fcbff5d86103c010a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42086-cwe-79-improper-neutralization-of-i-822ba6b7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42086%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenC3%20cosmos&amp;severity=medium&amp;id=69f8dc9fcbff5d86103c0107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42085-cwe-23-relative-path-traversal-in-o-bd1eeaf3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42085%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20OpenC3%20cosmos&amp;severity=medium&amp;id=69f8dc9fcbff5d86103c0100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-weekly-analysis-2026-w18-2026-04-27-throug-bf725c85</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Weekly%20Analysis%3A%202026-W18%20(2026-04-27%20through%202026-05-03)%2C%20(Mon%2C%20May%204th)&amp;severity=medium&amp;id=69f8d5b6cbff5d86103a6693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42084-cwe-620-unverified-password-change--56e9bd54</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42084%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20OpenC3%20cosmos&amp;severity=high&amp;id=69f8dc9fcbff5d86103c00fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42052-cwe-79-improper-neutralization-of-i-d3cab7c2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42052%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beetbox%20beets&amp;severity=medium&amp;id=69f8dc9fcbff5d86103c00f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42080-cwe-22-improper-limitation-of-a-pat-ed36f736</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42080%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20icip-cas%20PPTAgent&amp;severity=medium&amp;id=69f8d219cbff5d86103970aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42079-cwe-95-improper-neutralization-of-d-3a45d66c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42079%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20icip-cas%20PPTAgent&amp;severity=high&amp;id=69f8d219cbff5d86103970a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40682-cwe-611-improper-restriction-of-xml-6aaa4555</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40682%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20OpenNLP&amp;severity=critical&amp;id=69f8d216cbff5d8610397041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42078-cwe-22-improper-limitation-of-a-pat-45444728</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42078%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20icip-cas%20PPTAgent&amp;severity=medium&amp;id=69f8d219cbff5d86103970a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42077-cwe-1321-improperly-controlled-modi-8f0cb503</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42077%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20EvoMap%20evolver&amp;severity=medium&amp;id=69f8d216cbff5d861039704f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42076-cwe-78-improper-neutralization-of-s-c99684a6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42076%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20EvoMap%20evolver&amp;severity=critical&amp;id=69f8d216cbff5d861039704b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42810-cwe-116-improper-encoding-or-escapi-10939b62</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42810%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Polaris&amp;severity=critical&amp;id=69f8d219cbff5d86103970b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42075-cwe-22-improper-limitation-of-a-pat-a1734607</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42075%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20EvoMap%20evolver&amp;severity=high&amp;id=69f8d216cbff5d8610397047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25293-cwe-863-in-qualcomm-inc-snapdragon-187f3733</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25293%3A%20CWE-863%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=69f8d216cbff5d8610397036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25266-cwe-749-exposed-dangerous-method-or-5d002d62</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25266%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69f8d216cbff5d8610397033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24082-cwe-416-use-after-free-in-qualcomm--724d1881</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24082%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69f8d213cbff5d8610396f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47408-cwe-822-untrusted-pointer-dereferen-03750591</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47408%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69f8d213cbff5d8610396f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47407-cwe-367-time-of-check-time-of-use-t-7c06b9be</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47407%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69f8d213cbff5d8610396f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42027-cwe-470-use-of-externally-controlle-00ce3b22</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42027%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20OpenNLP&amp;severity=critical&amp;id=69f8d216cbff5d8610397044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47406-cwe-126-buffer-over-read-in-qualcom-e176a251</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47406%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69f8d213cbff5d8610396f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47405-cwe-822-untrusted-pointer-dereferen-fa12a15f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47405%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69f8d213cbff5d8610396f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47404-cwe-120-buffer-copy-without-checkin-5b67ae8b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47404%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69f8d213cbff5d8610396f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47403-cwe-126-buffer-over-read-in-qualcom-0ff9f6c2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47403%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69f8d213cbff5d8610396f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47401-cwe-126-buffer-over-read-in-qualcom-3008017c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47401%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69f8d213cbff5d8610396f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42090-cwe-79-improper-neutralization-of-i-cbc3c33c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42090%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20notesnook&amp;severity=critical&amp;id=69f8d219cbff5d86103970ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42440-cwe-789-memory-allocation-with-exce-d34a4fd5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42440%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20Apache%20Software%20Foundation%20Apache%20OpenNLP&amp;severity=high&amp;id=69f8d219cbff5d86103970b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26956-cwe-693-protection-mechanism-failur-245adbf4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26956%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20patriksimek%20vm2&amp;severity=critical&amp;id=69f8d216cbff5d861039703d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42811-cwe-917-improper-neutralization-of--891bc365</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42811%3A%20CWE-917%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20Expression%20Language%20Statement%20(&apos;Expression%20Language%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Polaris&amp;severity=critical&amp;id=69f8d219cbff5d86103970ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26332-cwe-94-improper-control-of-generati-e11104c3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26332%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20patriksimek%20vm2&amp;severity=critical&amp;id=69f8d216cbff5d8610397039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24781-cwe-94-improper-control-of-generati-5f742669</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24781%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20patriksimek%20vm2&amp;severity=critical&amp;id=69f8d216cbff5d861039702c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24120-cwe-693-protection-mechanism-failur-4681393a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24120%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20patriksimek%20vm2&amp;severity=critical&amp;id=69f8d213cbff5d8610396f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24118-cwe-94-improper-control-of-generati-5f3ab711</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24118%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20patriksimek%20vm2&amp;severity=critical&amp;id=69f8d213cbff5d8610396f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42809-cwe-862-missing-authorization-in-ap-8b4c3d6b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42809%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Polaris&amp;severity=critical&amp;id=69f8cb08cbff5d86103668c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42812-cwe-863-incorrect-authorization-in--933c527c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42812%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Polaris&amp;severity=critical&amp;id=69f8cb08cbff5d86103668c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29514-cwe-183-permissive-list-of-allowed--3563f30f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29514%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20netbox-community%20netbox&amp;severity=high&amp;id=69f8cb08cbff5d86103668a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42376-cwe-798-use-of-hard-coded-credentia-2ee526c5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42376%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20D-Link%20DIR-456U%20Firmware&amp;severity=critical&amp;id=69f8cb08cbff5d86103668c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42375-cwe-798-use-of-hard-coded-credentia-93a99dda</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42375%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20D-Link%20DIR-600L%20Firmware&amp;severity=critical&amp;id=69f8cb08cbff5d86103668bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42374-cwe-798-use-of-hard-coded-credentia-b44726b3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42374%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20D-Link%20DIR-600L%20Firmware&amp;severity=critical&amp;id=69f8cb08cbff5d86103668ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42373-cwe-798-use-of-hard-coded-credentia-eb6cfb77</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42373%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20D-Link%20DIR-605L%20Firmware&amp;severity=critical&amp;id=69f8cb08cbff5d86103668b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42372-cwe-798-use-of-hard-coded-credentia-90764c99</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42372%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20D-Link%20DIR-605L%20Firmware&amp;severity=high&amp;id=69f8cb08cbff5d86103668b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40563-cwe-94-improper-control-of-generati-a7b1ae41</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40563%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Atlas&amp;severity=high&amp;id=69f8c07ccbff5d86103298a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13605-cwe-78-improper-neutralization-of-s-10313987</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13605%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%203onedata%20GW1101-1D(RS-485)-TB-P&amp;severity=critical&amp;id=69f8b5f1cbff5d86102f7002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29169-cwe-476-null-pointer-dereference-in-63de7a1e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29169%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=69f8b5f1cbff5d86102f7010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23918-cwe-415-double-free-in-apache-softw-3a62062e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23918%3A%20CWE-415%20Double%20Free%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=69f8b5f1cbff5d86102f700d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33006-cwe-208-observable-timing-discrepan-c50222f8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33006%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=69f8b5f1cbff5d86102f7013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33007-cwe-476-null-pointer-dereference-in-74f015ae</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33007%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=69f8b5f1cbff5d86102f7016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33523-cwe-443-http-response-splitting-in--c69e1a01</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33523%3A%20CWE-443%3A%20HTTP%20response%20splitting%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=69f8b5f1cbff5d86102f7019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantomraven-wave-5-new-undocumented-npm-supply-ch-9ed44d51</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhantomRaven%20Wave%205%3A%20New%20Undocumented%20NPM%20Supply%20Chain%20Campaign%20Targets%20DeFi%2C%20Cloud%2C%20and%20AI%20Developers&amp;severity=medium&amp;id=69f8af02cbff5d86102ac390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6501-cwe-611-improper-restriction-of-xml--0bc7435a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6501%3A%20CWE-611%20Improper%20restriction%20of%20XML%20external%20entity%20reference%20in%20ILM%20%20Informatique%20jOpenDocument&amp;severity=medium&amp;id=69f8b5f1cbff5d86102f701f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dshield-honeypot-update-mon-may-4th-0bede036</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DShield%20Honeypot%20Update%2C%20(Mon%2C%20May%204th)&amp;severity=medium&amp;id=69f8af03cbff5d86102ac5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6500-cwe-256-plaintext-storage-of-a-passw-4aec615e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6500%3A%20CWE-256%20Plaintext%20storage%20of%20a%20password%20in%20ILM%20Informatique%20OpenConcerto&amp;severity=medium&amp;id=69f8b5f1cbff5d86102f701c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6499-cwe-732-incorrect-permission-assignm-81d8601f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6499%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ILM%20Informatique%20OpenConcerto&amp;severity=low&amp;id=69f8ab6dcbff5d8610291517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/4th-may-threat-intelligence-report-c7805fa7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=4th%20May%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69f8a4a6cbff5d8610253d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6266-authentication-bypass-by-primary-wea-44438c98</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6266%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=high&amp;id=69f8ab6dcbff5d8610291512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58074-cwe-1386-insecure-operation-on-wind-5dfdd185</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58074%3A%20CWE-1386%3A%20Insecure%20Operation%20on%20Windows%20Junction%20%2F%20Mount%20Point%20in%20Gen%20Digital%20Norton%20Secure%20VPN&amp;severity=high&amp;id=69f8a0facbff5d861022a2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33857-cwe-125-out-of-bounds-read-in-apach-b5d3ee07</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33857%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=69f8a0facbff5d861022a2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-ma-roundup-33-deals-announced-in-apr-828da262</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20M%26A%20Roundup%3A%2033%20Deals%20Announced%20in%20April%202026&amp;severity=medium&amp;id=69f899cfcbff5d86101f1d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34032-cwe-170-improper-null-termination-i-ded46ec3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34032%3A%20CWE-170%20Improper%20Null%20Termination%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=69f8a0facbff5d861022a2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/digicert-revokes-certificates-after-support-portal-e29c67db</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DigiCert%20Revokes%20Certificates%20After%20Support%20Portal%20Hack&amp;severity=medium&amp;id=69f8964acbff5d86101bc2ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34059-cwe-126-buffer-over-read-in-apache--d7754aa7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34059%3A%20CWE-126%20Buffer%20Over-read%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=69f899d7cbff5d86101f249d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24072-cwe-269-improper-privilege-manageme-02856ade</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24072%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=69f899d7cbff5d86101f249a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-motivation-of-droids-from-the-star-wars-univer-0d0bfb47</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20motivation%20of%20droids%20from%20the%20%E2%80%9CStar%20Wars%E2%80%9D%20universe%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69f88bedcbff5d861014fe7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3120-cwe-94-improper-control-of-generatio-7e954ac9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3120%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Profelis%20Information%20and%20Consulting%20Trade%20and%20Industry%20Limited%20Company%20SambaBox&amp;severity=high&amp;id=69f88f70cbff5d86101781a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-copy-fail-linux-vulnerability-begi-192de6be</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20%E2%80%98Copy%20Fail%E2%80%99%20Linux%20Vulnerability%20Begins&amp;severity=medium&amp;id=69f87a2acbff5d861006fe8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-rolls-out-advanced-security-for-chatgpt-acc-3f28560a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Rolls%20Out%20Advanced%20Security%20for%20ChatGPT%20Accounts&amp;severity=medium&amp;id=69f86896cbff5d8610fce594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33846-improper-handling-of-length-paramet-7ae23611</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33846%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=high&amp;id=69f899d7cbff5d86101f24a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7750-buffer-overflow-in-totolink-n300rh-7f48fab1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7750%3A%20Buffer%20Overflow%20in%20Totolink%20N300RH&amp;severity=high&amp;id=69f94db6cbff5d86107e49eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7749-buffer-overflow-in-totolink-n300rh-2c185198</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7749%3A%20Buffer%20Overflow%20in%20Totolink%20N300RH&amp;severity=high&amp;id=69f94292cbff5d86107871e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7748-buffer-overflow-in-totolink-n300rh-843736be</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7748%3A%20Buffer%20Overflow%20in%20Totolink%20N300RH&amp;severity=high&amp;id=69f87dafcbff5d861009f9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-40000-servers-compromised-in-ongoing-cpanel-e-65789da0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2040%2C000%20Servers%20Compromised%20in%20Ongoing%20cPanel%20Exploitation&amp;severity=medium&amp;id=69f85a86cbff5d8610f0eb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7747-buffer-overflow-in-totolink-n300rh-d88a1f5e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7747%3A%20Buffer%20Overflow%20in%20Totolink%20N300RH&amp;severity=critical&amp;id=69f85a92cbff5d8610f0f8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7746-sql-injection-in-sourcecodester-web--7c031780</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7746%3A%20SQL%20Injection%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69f85a92cbff5d8610f0f899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7745-sql-injection-in-codeastro-online-cl-4502f04d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7745%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69f85a92cbff5d8610f0f892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14320-cwe-79-improper-neutralization-of-i-1ac5354a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14320%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Tegsoft%20Management%20and%20Information%20Services%20Trade%20Limited%20Company%20Online%20Support%20Application&amp;severity=critical&amp;id=69f85a92cbff5d8610f0f88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7744-sql-injection-in-codeastro-online-cl-9cebfb0f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7744%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69f94db6cbff5d86107e49f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7743-sql-injection-in-codeastro-online-cl-38f5a1f6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7743%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69f94292cbff5d86107871e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edtech-firm-instructure-discloses-data-breach-amid-c0f76f82</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Edtech%20Firm%20Instructure%20Discloses%20Data%20Breach%20Amid%20Hacker%20Leak%20Threats&amp;severity=medium&amp;id=69f8456ecbff5d8610d4d05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7742-sql-injection-in-codeastro-online-cl-33f88b3c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7742%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69f87dafcbff5d861009f9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7741-sql-injection-in-codeastro-online-cl-62302309</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7741%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69f899d7cbff5d86101f24a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7740-denial-of-service-in-justdan96-tsmux-b6039e94</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7740%3A%20Denial%20of%20Service%20in%20justdan96%20tsMuxer&amp;severity=medium&amp;id=69f83e6bcbff5d8610c9d5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7739-denial-of-service-in-justdan96-tsmux-ba1511c3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7739%3A%20Denial%20of%20Service%20in%20justdan96%20tsMuxer&amp;severity=medium&amp;id=69f83e6bcbff5d8610c9d5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7738-path-traversal-in-puchunjie-doc-tool-b53db911</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7738%3A%20Path%20Traversal%20in%20puchunjie%20doc-tools-mcp&amp;severity=medium&amp;id=69f83e68cbff5d8610c9d5b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5335-cwe-200-information-exposure-in-magi-809c4f17</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5335%3A%20CWE-200%20Information%20Exposure%20in%20Magic%20Export%20%26%20Import&amp;severity=medium&amp;id=69f83e68cbff5d8610c9d5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7737-out-of-bounds-read-in-osrg-gobgp-37c42693</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7737%3A%20Out-of-Bounds%20Read%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69f83e68cbff5d8610c9d5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20451-cwe-843-access-of-resource-using-in-bafae05e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20451%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69f83e68cbff5d8610c9d59f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29200-cwe-639-insecure-direct-object-refe-d3747bfb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29200%3A%20CWE-639%20Insecure%20Direct%20Object%20Reference%20(IDOR)%20in%20WebPros%20Comet%20Backup&amp;severity=critical&amp;id=69f83e68cbff5d8610c9d5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20450-cwe-617-reachable-assertion-in-medi-52e08f5d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20450%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69f83e68cbff5d8610c9d59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20449-cwe-120-classic-buffer-overflow-in--fbc4e04a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20449%3A%20CWE-120%20Classic%20Buffer%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69f83e68cbff5d8610c9d599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20448-cwe-280-improper-handling-of-insuff-14d84d76</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20448%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69f83e68cbff5d8610c9d595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20447-cwe-125-out-of-bounds-read-in-media-3e583fb2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20447%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69f83e68cbff5d8610c9d592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7736-integer-underflow-in-osrg-gobgp-a62c790c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7736%3A%20Integer%20Underflow%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69f83e68cbff5d8610c9d5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7735-buffer-overflow-in-osrg-gobgp-bf5e39d1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7735%3A%20Buffer%20Overflow%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69f83057cbff5d8610beff1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7734-denial-of-service-in-osrg-gobgp-2676a677</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7734%3A%20Denial%20of%20Service%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69f83057cbff5d8610beff12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7733-unrestricted-upload-in-funadmin-6490b6d1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7733%3A%20Unrestricted%20Upload%20in%20funadmin&amp;severity=medium&amp;id=69f83057cbff5d8610beff0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7732-unrestricted-upload-in-code-projects-60bab1f7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7732%3A%20Unrestricted%20Upload%20in%20code-projects%20BloodBank%20Managing%20System&amp;severity=medium&amp;id=69f83057cbff5d8610beff03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7731-sql-injection-in-code-projects-blood-b1edd902</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7731%3A%20SQL%20Injection%20in%20code-projects%20BloodBank%20Managing%20System&amp;severity=medium&amp;id=69f83057cbff5d8610befefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7730-os-command-injection-in-privsim-mcp--12820676</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7730%3A%20OS%20Command%20Injection%20in%20privsim%20mcp-test-runner&amp;severity=medium&amp;id=69f81ef8cbff5d8610b05bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7729-server-side-request-forgery-in-pixel-c312906a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7729%3A%20Server-Side%20Request%20Forgery%20in%20pixelsock%20directus-mcp&amp;severity=medium&amp;id=69f81ef8cbff5d8610b05bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7728-path-traversal-in-ryanjoachim-mcp-rt-2295c497</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7728%3A%20Path%20Traversal%20in%20ryanjoachim%20mcp-rtfm&amp;severity=medium&amp;id=69f81ef8cbff5d8610b05bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7727-sql-injection-in-shandong-hoteam-sof-d02ce6ef</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7727%3A%20SQL%20Injection%20in%20Shandong%20Hoteam%20Software%20PDM%20Product%20Data%20Management%20System&amp;severity=medium&amp;id=69f81ef8cbff5d8610b05be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7725-argument-injection-in-prefecthq-pref-a780d17c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7725%3A%20Argument%20Injection%20in%20PrefectHQ%20prefect&amp;severity=medium&amp;id=69f81ef8cbff5d8610b05bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7724-time-of-check-time-of-use-in-prefect-e83a48ea</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7724%3A%20Time-of-check%20Time-of-use%20in%20PrefectHQ%20prefect&amp;severity=low&amp;id=69f80d4bcbff5d86109fed88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7723-missing-authentication-in-prefecthq--d4f96c3a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7723%3A%20Missing%20Authentication%20in%20PrefectHQ%20prefect&amp;severity=medium&amp;id=69f80d4bcbff5d86109fed7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7722-improper-authentication-in-prefecthq-b110120e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7722%3A%20Improper%20Authentication%20in%20PrefectHQ%20prefect&amp;severity=medium&amp;id=69f80d4bcbff5d86109fed74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7721-command-injection-in-totolink-wa300-fd9713b8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7721%3A%20Command%20Injection%20in%20Totolink%20WA300&amp;severity=medium&amp;id=69f80d4bcbff5d86109fed6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-may-4th-2026-httpsiscsans-e5649b55</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20May%204th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9916%2C%20(Mon%2C%20May%204th)&amp;severity=medium&amp;id=69f7ff1fcbff5d861096792a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7720-command-injection-in-totolink-wa300-2e8751fc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7720%3A%20Command%20Injection%20in%20Totolink%20WA300&amp;severity=medium&amp;id=69f7ff28cbff5d8610969078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7719-buffer-overflow-in-totolink-wa300-e943f95d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7719%3A%20Buffer%20Overflow%20in%20Totolink%20WA300&amp;severity=critical&amp;id=69f7ff28cbff5d861096905e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7718-command-injection-in-totolink-wa300-3a183b2d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7718%3A%20Command%20Injection%20in%20Totolink%20WA300&amp;severity=medium&amp;id=69f7ff28cbff5d8610969055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7717-buffer-overflow-in-totolink-wa300-d0708109</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7717%3A%20Buffer%20Overflow%20in%20Totolink%20WA300&amp;severity=high&amp;id=69f7f4d7cbff5d86108d83f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42370-cwe-787-out-of-bounds-write-in-geov-cb9b994f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42370%3A%20CWE-787%20Out-of-bounds%20write%20in%20GeoVision%20Inc.%20GV-VMS%20V20.0.2&amp;severity=critical&amp;id=69f7f4d3cbff5d86108d834e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7372-cwe-787-out-of-bounds-write-in-geovi-eed18717</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7372%3A%20CWE-787%20Out-of-bounds%20write%20in%20GeoVision%20Inc.%20GV-VMS%20V20.0.2&amp;severity=critical&amp;id=69f7f4d3cbff5d86108d835a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42369-cwe-787-out-of-bounds-write-in-geov-0757b787</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42369%3A%20CWE-787%20Out-of-bounds%20write%20in%20GeoVision%20Inc.%20GV-VMS%20V20.0.2&amp;severity=critical&amp;id=69f7f4d3cbff5d86108d834a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42368-cwe-266-incorrect-privilege-assignm-b84e399c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42368%3A%20CWE-266%20Incorrect%20privilege%20assignment%20in%20GeoVision%20Inc.%20GV-LPC2011%2FLPC2211&amp;severity=critical&amp;id=69f7f4d3cbff5d86108d8346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7716-sql-injection-in-code-projects-gym-m-3265e13c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7716%3A%20SQL%20Injection%20in%20code-projects%20Gym%20Management%20System%20In%20PHP&amp;severity=medium&amp;id=69f7f4d7cbff5d86108d83ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42367-cwe-522-insufficiently-protected-cr-d0b33a9f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42367%3A%20CWE-522%20-%20Insufficiently%20Protected%20Credentials%20in%20GeoVision%20Inc.%20GV-LPC2011%2FLPC2211&amp;severity=medium&amp;id=69f7f4d3cbff5d86108d8342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7371-cwe-79-improper-neutralization-of-in-0067247b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7371%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GeoVision%20Inc.%20GV-LPC2011%2FLPC2211&amp;severity=high&amp;id=69f7f4d3cbff5d86108d8356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42366-cwe-79-improper-neutralization-of-i-c83b52de</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42366%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GeoVision%20Inc.%20GV-LPC2011%2FLPC2211&amp;severity=high&amp;id=69f7f4d3cbff5d86108d833e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42365-cwe-341-predictable-from-observable-43117b82</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42365%3A%20CWE-341%20Predictable%20from%20observable%20state%20in%20GeoVision%20Inc.%20GV-LPC2011%2FLPC2211&amp;severity=high&amp;id=69f7f4d3cbff5d86108d833a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42364-cwe-78-improper-neutralization-of-s-2ba50633</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42364%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20GeoVision%20Inc.%20GV-LPC2011%2FLPC2211&amp;severity=critical&amp;id=69f7f4d3cbff5d86108d8336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7161-cwe-656-reliance-on-security-through-3b618742</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7161%3A%20CWE-656%20-%20Reliance%20on%20Security%20Through%20Obscurity%20in%20GeoVision%20Inc.%20GV-IP%20Device%20Utility&amp;severity=critical&amp;id=69f7f4d3cbff5d86108d8352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7715-path-traversal-in-ravenwits-mcp-serv-77ab2ef2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7715%3A%20Path%20Traversal%20in%20ravenwits%20mcp-server-arangodb&amp;severity=medium&amp;id=69f7f4d7cbff5d86108d83e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7714-missing-authentication-in-crocodiles-c35d5ea3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7714%3A%20Missing%20Authentication%20in%20crocodilestick%20Calibre-Web-Automated&amp;severity=medium&amp;id=69f7f4d7cbff5d86108d83d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7713-improper-authorization-in-crocodiles-f704c365</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7713%3A%20Improper%20Authorization%20in%20crocodilestick%20Calibre-Web-Automated&amp;severity=medium&amp;id=69f7e6bbcbff5d86107d46c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/traccar-gps-tracking-system-6111-cross-site-websoc-53290ec3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Traccar%20GPS%20Tracking%20System%206.11.1%20-%20Cross-Site%20WebSocket%20Hijacking%20(CSWSH)&amp;severity=medium&amp;id=69f9a0c3cbff5d8610d729dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-11-24h2-local-privilege-escalation-f974c189</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2011%2024H2%20-%20Local%20Privilege%20Escalation&amp;severity=high&amp;id=69f9a0c3cbff5d8610d729d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mindsdb-25911-path-traversal-fd94b877</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MindsDB%20%2025.9.1.1%20-%20Path%20Traversal&amp;severity=medium&amp;id=69f9a0c3cbff5d8610d729d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linksys-e1200-2004-authenticated-stack-buffer-over-74b88e3c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linksys%20E1200%202.0.04%20-%20Authenticated%20Stack%20Buffer%20Overflow%20(RCE)&amp;severity=critical&amp;id=69f9a0c3cbff5d8610d729cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-nftables-6193-local-privilege-escalation-9b2358c8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20nf_tables%206.19.3%20-%20Local%20Privilege%20Escalation&amp;severity=high&amp;id=69f9a0c2cbff5d8610d729c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-kernel-procreaddirde-618-rc5-local-privilege-e32ebb73</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20Kernel%20proc_readdir_de()%206.18-rc5%20-%20Local%20Privilege%20Escalation&amp;severity=high&amp;id=69f9a0c2cbff5d8610d729c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-05-05-67c40ba1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-05-05&amp;severity=medium&amp;id=69f99fc3cbff5d8610d606f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-05-04-40421168</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-05-04&amp;severity=medium&amp;id=69f93476cbff5d8610586140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67796-na-80da0fb2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67796%3A%20n%2Fa&amp;severity=high&amp;id=69f8f1b7cbff5d861042a38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38751-na-bb18b10a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38751%3A%20n%2Fa&amp;severity=high&amp;id=69f8eaaecbff5d8610415ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37459-na-effd3c5b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37459%3A%20n%2Fa&amp;severity=high&amp;id=69f8dc9fcbff5d86103c00ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38669-na-a0a1d8c0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38669%3A%20n%2Fa&amp;severity=medium&amp;id=69f8cb08cbff5d86103668b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37461-na-e34dc6dd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37461%3A%20n%2Fa&amp;severity=high&amp;id=69f8cb08cbff5d86103668ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37458-na-9c7970ba</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37458%3A%20n%2Fa&amp;severity=medium&amp;id=69f8c07ccbff5d86103298a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36365-na-fd77e390</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36365%3A%20n%2Fa&amp;severity=high&amp;id=69f8c07ccbff5d861032989b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70071-na-f62aedc1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70071%3A%20n%2Fa&amp;severity=medium&amp;id=69f8c07ccbff5d8610329897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70072-na-cb6848bb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70072%3A%20n%2Fa&amp;severity=medium&amp;id=69f8b5f1cbff5d86102f7009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70070-na-598c002c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70070%3A%20n%2Fa&amp;severity=medium&amp;id=69f8b5f1cbff5d86102f7005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31205-na-71e8bb88</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31205%3A%20n%2Fa&amp;severity=medium&amp;id=69f8ab6dcbff5d861029150a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70069-na-a3cbe8d4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70069%3A%20n%2Fa&amp;severity=high&amp;id=69f8ab6dcbff5d8610291506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70067-na-23be5bda</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70067%3A%20n%2Fa&amp;severity=critical&amp;id=69f8ab6dcbff5d8610291501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-05-04-b00ee31c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-05-04&amp;severity=low&amp;id=69f86f97cbff5d8610010947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6948-cwe-770-allocation-of-resources-with-0c52d6a7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6948%3A%20CWE-770%20Allocation%20of%20resources%20without%20limits%20or%20throttling%20in%20Rapid7%20Velociraptor&amp;severity=medium&amp;id=69f7e6bbcbff5d86107d46c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7712-deserialization-in-mindsdb-da28edb5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7712%3A%20Deserialization%20in%20MindsDB&amp;severity=medium&amp;id=69f7df7ccbff5d8610772820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7711-unrestricted-upload-in-mindsdb-ccea885d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7711%3A%20Unrestricted%20Upload%20in%20MindsDB&amp;severity=medium&amp;id=69f7df7ccbff5d8610772817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7710-improper-authentication-in-yunaiv-yu-276b7370</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7710%3A%20Improper%20Authentication%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69f7dbf7cbff5d8610758d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7709-improper-authorization-in-janeczku-c-392e11eb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7709%3A%20Improper%20Authorization%20in%20janeczku%20Calibre-Web&amp;severity=medium&amp;id=69f7d893cbff5d861073b5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7708-denial-of-service-in-open5gs-34aec2ec</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7708%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f7d4efcbff5d86107207bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7707-denial-of-service-in-open5gs-505e9b47</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7707%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f7cde9cbff5d86106f4f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7706-denial-of-service-in-open5gs-3baab19a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7706%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f7ca83cbff5d86106ce7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7705-command-injection-in-jd-cloud-jdcos-e6893df5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7705%3A%20Command%20Injection%20in%20JD%20Cloud%20JDCOS&amp;severity=medium&amp;id=69f7ca83cbff5d86106ce7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-465-released-sun-may-3rd-82ee2003</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.6.5%20Released%2C%20(Sun%2C%20May%203rd)&amp;severity=medium&amp;id=69f77d0bcbff5d8610411659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7704-path-traversal-in-av-stumpfl-pixera--14208727</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7704%3A%20Path%20Traversal%20in%20AV%20Stumpfl%20Pixera%20Two%20Media%20Server&amp;severity=medium&amp;id=69f7fc3acbff5d861094f630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-military-reaches-deals-with-7-tech-companies-to-1823914c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Military%20Reaches%20Deals%20With%207%20Tech%20Companies%20to%20Use%20Their%20AI%20on%20Classified%20Systems&amp;severity=medium&amp;id=69f7764acbff5d86103da028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7703-code-injection-in-av-stumpfl-pixera--c298ebf1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7703%3A%20Code%20Injection%20in%20AV%20Stumpfl%20Pixera%20Two%20Media%20Server&amp;severity=medium&amp;id=69f77987cbff5d86103feb78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7702-authorization-bypass-in-toeverything-39388ee2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7702%3A%20Authorization%20Bypass%20in%20toeverything%20AFFiNE&amp;severity=medium&amp;id=69f7727fcbff5d86103b98e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7701-null-pointer-dereference-in-telegram-15617371</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7701%3A%20NULL%20Pointer%20Dereference%20in%20Telegram%20Desktop&amp;severity=medium&amp;id=69f76efbcbff5d861037fa28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7700-code-injection-in-langflow-ai-langfl-8eb2b700</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7700%3A%20Code%20Injection%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69f75a03cbff5d861013ca42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7699-sql-injection-in-dromara-maxkey-37ec9aba</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7699%3A%20SQL%20Injection%20in%20Dromara%20MaxKey&amp;severity=medium&amp;id=69f75a03cbff5d861013ca3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7698-os-command-injection-in-tiandy-easy7-177551a7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7698%3A%20OS%20Command%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69f7565fcbff5d86100ebd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7697-sql-injection-in-amtt-hotel-broadban-dcce604e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7697%3A%20SQL%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=69f74f57cbff5d861004d81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7696-unrestricted-upload-in-acrel-electri-4880238c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7696%3A%20Unrestricted%20Upload%20in%20Acrel%20Electrical%20EEMS%20Enterprise%20Power%20Operation%20and%20Maintenance%20Cloud%20Platform&amp;severity=medium&amp;id=69f74147cbff5d8610fad20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7695-sql-injection-in-acrel-electrical-ee-5a342092</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7695%3A%20SQL%20Injection%20in%20Acrel%20Electrical%20EEMS%20Enterprise%20Power%20Operation%20and%20Maintenance%20Cloud%20Platform&amp;severity=medium&amp;id=69f74147cbff5d8610fad207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7694-sql-injection-in-acrel-electrical-ec-7023ad70</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7694%3A%20SQL%20Injection%20in%20Acrel%20Electrical%20ECEMS%20Enterprise%20Microgrid%20Energy%20Efficiency%20Management%20System&amp;severity=medium&amp;id=69f736bbcbff5d8610f52a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7692-command-injection-in-wavlink-wl-wn57-3bbfefd5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7692%3A%20Command%20Injection%20in%20Wavlink%20WL-WN570HA1&amp;severity=medium&amp;id=69f72fd4cbff5d8610f05c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7691-command-injection-in-wavlink-wl-wn57-6072cc80</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7691%3A%20Command%20Injection%20in%20Wavlink%20WL-WN570HA1&amp;severity=medium&amp;id=69f72528cbff5d8610ea622d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7690-command-injection-in-wavlink-wl-wn57-11676fd8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7690%3A%20Command%20Injection%20in%20Wavlink%20WL-WN570HA1&amp;severity=medium&amp;id=69f7fc3acbff5d861094f637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7689-improper-verification-of-cryptograph-d2acf9df</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7689%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Dolibarr%20ERP%20CRM&amp;severity=medium&amp;id=69f71a9bcbff5d8610e3b414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7688-sql-injection-in-dolibarr-erp-crm-929b3058</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7688%3A%20SQL%20Injection%20in%20Dolibarr%20ERP%20CRM&amp;severity=low&amp;id=69f71a9bcbff5d8610e3b40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7687-command-injection-in-langflow-ai-lan-30412ff8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7687%3A%20Command%20Injection%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69f7fc3acbff5d861094f63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7686-improper-access-controls-in-eyeo-adb-60d52203</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7686%3A%20Improper%20Access%20Controls%20in%20eyeo%20Adblock%20Plus&amp;severity=medium&amp;id=69f701fecbff5d8610ceebcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7685-buffer-overflow-in-edimax-br-6208ac-c0df4819</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7685%3A%20Buffer%20Overflow%20in%20Edimax%20BR-6208AC&amp;severity=high&amp;id=69f6f793cbff5d8610c7510f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7684-buffer-overflow-in-edimax-br-6428nc-0d59eb52</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7684%3A%20Buffer%20Overflow%20in%20Edimax%20BR-6428nC&amp;severity=high&amp;id=69f6f793cbff5d8610c75109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7683-command-injection-in-edimax-br-6428n-fc796393</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7683%3A%20Command%20Injection%20in%20Edimax%20BR-6428nC&amp;severity=medium&amp;id=69f6f793cbff5d8610c75101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7682-command-injection-in-edimax-br-6208a-53eae848</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7682%3A%20Command%20Injection%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=69f6eceacbff5d8610c1b6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5337-cwe-639-authorization-bypass-through-c4e1354a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5337%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Frontend%20File%20Manager%20Plugin&amp;severity=medium&amp;id=69f6eceacbff5d8610c1b6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7681-authorization-bypass-in-jsbroks-coco-b6450487</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7681%3A%20Authorization%20Bypass%20in%20jsbroks%20COCO%20Annotator&amp;severity=medium&amp;id=69f6ded7cbff5d8610b72e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7680-path-traversal-in-jsbroks-coco-annot-24f162c4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7680%3A%20Path%20Traversal%20in%20jsbroks%20COCO%20Annotator&amp;severity=medium&amp;id=69f6ded7cbff5d8610b72e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5063-cwe-79-improper-neutralization-of-in-f0ffe501</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5063%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=high&amp;id=69f6ded7cbff5d8610b72e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7679-improper-authentication-in-yunaiv-yu-ee6c27e5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7679%3A%20Improper%20Authentication%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69f6cd8dcbff5d8610ac6b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7678-sql-injection-in-yunaiv-yudao-cloud-fe5735d0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7678%3A%20SQL%20Injection%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69f6cd8dcbff5d8610ac6b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7677-cross-site-scripting-in-kerwincui-fa-13a22915</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7677%3A%20Cross%20Site%20Scripting%20in%20kerwincui%20FastBee&amp;severity=medium&amp;id=69f6cd8dcbff5d8610ac6b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7676-path-traversal-in-kerwincui-fastbee-126175db</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7676%3A%20Path%20Traversal%20in%20kerwincui%20FastBee&amp;severity=medium&amp;id=69f6cd8dcbff5d8610ac6b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7675-buffer-overflow-in-shenzhen-libituo--9cc00f70</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7675%3A%20Buffer%20Overflow%20in%20Shenzhen%20Libituo%20Technology%20LBT-T300-HW1&amp;severity=high&amp;id=69f6bbaecbff5d86109dae6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7674-buffer-overflow-in-shenzhen-libituo--817395ad</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7674%3A%20Buffer%20Overflow%20in%20Shenzhen%20Libituo%20Technology%20LBT-T300-HW1&amp;severity=high&amp;id=69f6ada0cbff5d86109381c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7673-unrestricted-upload-in-crmebjava-91b53419</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7673%3A%20Unrestricted%20Upload%20in%20crmeb_java&amp;severity=medium&amp;id=69f6ada0cbff5d86109381ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40561-cwe-444-inconsistent-interpretation-b07871be</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40561%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20KAZUHO%20Starlet&amp;severity=medium&amp;id=69f6a35ccbff5d861079c762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7672-sql-injection-in-youlaitech-youlai-b-6befeedb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7672%3A%20SQL%20Injection%20in%20youlaitech%20youlai-boot&amp;severity=medium&amp;id=69f6917ecbff5d861040c604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-05-04-55d35c73</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-05-04&amp;severity=medium&amp;id=69f84c5dcbff5d8610e2922b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-05-03-f6ca8e8a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-05-03&amp;severity=medium&amp;id=69f7e2f6cbff5d861078c260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-05-03-c3963915</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-05-03&amp;severity=low&amp;id=69f6c2afcbff5d8610a31732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7671-improper-restriction-of-excessive-au-94645b98</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7671%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20CodeWise%20Tornet%20Scooter%20Mobile%20App&amp;severity=medium&amp;id=69f68dfbcbff5d86103d8c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7670-sql-injection-in-jinher-oa-c785ee86</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7670%3A%20SQL%20Injection%20in%20Jinher%20OA&amp;severity=medium&amp;id=69f6aaaccbff5d8610924b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7669-deserialization-in-sgl-project-sglan-2898ad25</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7669%3A%20Code%20Injection%20in%20sgl-project%20SGLang&amp;severity=medium&amp;id=69f6755ecbff5d8610320ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7668-out-of-bounds-read-in-mikrotik-route-3e460a4d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7668%3A%20Out-of-Bounds%20Read%20in%20MikroTik%20RouterOS&amp;severity=medium&amp;id=69f65ce4cbff5d861022aff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7653-os-command-injection-in-r-huijts-mcp-88e5fb4e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7653%3A%20OS%20Command%20Injection%20in%20r-huijts%20mcp-server-rijksmuseum&amp;severity=medium&amp;id=69f61d7bcbff5d8610f684c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7645-path-traversal-in-ruvnet-sublinear-t-a7822373</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7645%3A%20Path%20Traversal%20in%20ruvnet%20sublinear-time-solver&amp;severity=medium&amp;id=69f619f7cbff5d8610f40e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7644-improper-authorization-in-chatgptnex-85b2e135</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7644%3A%20Improper%20Authorization%20in%20ChatGPTNextWeb%20NextChat&amp;severity=medium&amp;id=69f612efcbff5d8610ef5877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7643-permissive-cross-domain-policy-with--94568db8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7643%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20ChatGPTNextWeb%20NextChat&amp;severity=medium&amp;id=69f612efcbff5d8610ef5870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7642-os-command-injection-in-pskill9-webs-59775fcd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7642%3A%20OS%20Command%20Injection%20in%20pskill9%20website-downloader&amp;severity=medium&amp;id=69f60f6bcbff5d8610edce3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7633-file-inclusion-in-totolink-n300rh-b8cc889c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7633%3A%20File%20Inclusion%20in%20Totolink%20N300RH&amp;severity=medium&amp;id=69f6aaaccbff5d8610924b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7632-sql-injection-in-code-projects-onlin-a6b442be</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7632%3A%20SQL%20Injection%20in%20code-projects%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=69f604dfcbff5d8610e71489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7631-improper-authorization-in-code-proje-36d93c4e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7631%3A%20Improper%20Authorization%20in%20code-projects%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=69f604dfcbff5d8610e71482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0703-cwe-79-improper-neutralization-of-in-05571ca6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xlplugins%20NextMove%20Lite%20%E2%80%93%20Thank%20You%20Page%20for%20WooCommerce&amp;severity=medium&amp;id=69f5fdd6cbff5d8610e1a53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2554-cwe-639-authorization-bypass-through-d8e3f679</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2554%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wclovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce&amp;severity=high&amp;id=69f5fdd6cbff5d8610e1a544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3504-cwe-200-exposure-of-sensitive-inform-83a6a00a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3504%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dokaninc%20Dokan%3A%20AI%20Powered%20WooCommerce%20Multivendor%20Marketplace%20Solution%20%E2%80%93%20Build%20Your%20Own%20Amazon%2C%20eBay%2C%20Etsy&amp;severity=medium&amp;id=69f5fdd6cbff5d8610e1a549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7630-improper-authentication-in-innocomme-f011cad0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7630%3A%20Improper%20Authentication%20in%20innocommerce%20InnoShop&amp;severity=medium&amp;id=69f5fdd6cbff5d8610e1a559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7629-command-injection-in-kleneway-awesom-ccf94dc5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7629%3A%20Command%20Injection%20in%20kleneway%20awesome-cursor-mpc-server&amp;severity=medium&amp;id=69f5fdd6cbff5d8610e1a550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7628-command-injection-in-crazyrabbitltc--484ee93b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7628%3A%20Command%20Injection%20in%20crazyrabbitLTC%20mcp-code-review-server&amp;severity=medium&amp;id=69f5ec63cbff5d8610da0552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6525-cwe-476-null-pointer-dereference-in--d7f3bb48</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6525%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f5e8becbff5d8610d7fccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6817-cwe-79-improper-neutralization-of-in-ab5db7b8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6817%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Quiz%20Maker%20by%20AYS&amp;severity=medium&amp;id=69f5e1b7cbff5d8610d49438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6320-cwe-22-improper-limitation-of-a-path-85369388</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6320%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wordpresschef%20Salon%20Booking%20System%20%E2%80%93%20Free%20Version&amp;severity=high&amp;id=69f5e1b7cbff5d8610d49434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4061-cwe-89-improper-neutralization-of-sp-374a2408</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4061%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=high&amp;id=69f5e1b7cbff5d8610d4941e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4790-cwe-79-improper-neutralization-of-in-30c8a45e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4790%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor%20%E2%80%93%20Powerful%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=69f5e1b7cbff5d8610d49430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4062-cwe-89-improper-neutralization-of-sp-0d5ea7b2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4062%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=high&amp;id=69f5e1b7cbff5d8610d49425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4100-cwe-862-missing-authorization-in-str-dca3ff48</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4100%3A%20CWE-862%20Missing%20Authorization%20in%20strangerstudios%20Paid%20Memberships%20Pro%20%E2%80%93%20Content%20Restriction%2C%20User%20Registration%2C%20%26%20Paid%20Subscriptions&amp;severity=high&amp;id=69f5e1b7cbff5d8610d4942c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4060-cwe-89-improper-neutralization-of-sp-6aa5e903</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4060%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=high&amp;id=69f5e1b7cbff5d8610d49417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7627-path-traversal-in-8nite-metatrader-4-5c99a693</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7627%3A%20Path%20Traversal%20in%208nite%20metatrader-4-mcp&amp;severity=medium&amp;id=69f5de69cbff5d8610d25839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-bluekit-phishing-kit-features-ai-assistant-94f8ade8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Bluekit%20Phishing%20Kit%20Features%20AI%20Assistant&amp;severity=medium&amp;id=69f5d72acbff5d8610ce885c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7612-sql-injection-in-itsourcecode-courie-c362662c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7612%3A%20SQL%20Injection%20in%20itsourcecode%20Courier%20Management%20System&amp;severity=medium&amp;id=69f5d062cbff5d8610cadcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7611-insufficient-verification-of-data-au-dbc665fc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7611%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20TRENDnet%20TEW-821DAP&amp;severity=medium&amp;id=69f5c91ccbff5d8610c82157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5077-cwe-79-improper-neutralization-of-in-41856eb9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Total&amp;severity=medium&amp;id=69f5c91ccbff5d8610c82153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7610-cleartext-transmission-of-sensitive--43445030</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7610%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20TRENDnet%20TEW-821DAP&amp;severity=medium&amp;id=69f5c597cbff5d8610c60a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7491-cwe-639-authorization-bypass-through-2581445b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7491%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Zyosoft%20School%20App&amp;severity=high&amp;id=69f5c597cbff5d8610c60a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7490-cwe-434-unrestricted-upload-of-file--8a138abf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7490%3A%20CWE-434%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20Sunnet%20CTMS&amp;severity=high&amp;id=69f5c597cbff5d8610c60a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7489-cwe-89-improper-neutralization-of-sp-cfeb3c40</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7489%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Sunnet%20CTMS&amp;severity=high&amp;id=69f5c597cbff5d8610c60a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7609-os-command-injection-in-trendnet-tew-ff948fde</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7609%3A%20OS%20Command%20Injection%20in%20TRENDnet%20TEW-821DAP&amp;severity=medium&amp;id=69f5c597cbff5d8610c60a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7608-os-command-injection-in-trendnet-tew-3e6a76ab</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7608%3A%20OS%20Command%20Injection%20in%20TRENDnet%20TEW-821DAP&amp;severity=medium&amp;id=69f5be8fcbff5d8610c006e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5324-cwe-79-improper-neutralization-of-in-973821a2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=high&amp;id=69f5b787cbff5d8610baddf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4024-cwe-862-missing-authorization-in-wpr-6a21f9d6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4024%3A%20CWE-862%20Missing%20Authorization%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69f5b787cbff5d8610baddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6229-cwe-918-server-side-request-forgery--89dcb0b7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6229%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=high&amp;id=69f5b07ecbff5d8610b46280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6457-cwe-89-improper-neutralization-of-sp-160a988e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6457%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=medium&amp;id=69f5b07ecbff5d8610b46296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6449-cwe-285-improper-authorization-in-am-eeeb73fa</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6449%3A%20CWE-285%20Improper%20Authorization%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=69f5b07ecbff5d8610b4628c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2052-cwe-94-improper-control-of-generatio-f3e40995</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2052%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20marketingfire%20Widget%20Options%20%E2%80%93%20Advanced%20Conditional%20Visibility%20for%20Gutenberg%20Blocks%20%26%20Classic%20Widgets&amp;severity=high&amp;id=69f5b07ecbff5d8610b4626d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4650-cwe-862-missing-authorization-in-thi-ae3d51ad</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4650%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20FundPress%20%E2%80%93%20WordPress%20Donation%20Plugin&amp;severity=medium&amp;id=69f5b07ecbff5d8610b46275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7607-buffer-overflow-in-trendnet-tew-821d-8fd7a2ca</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7607%3A%20Buffer%20Overflow%20in%20TRENDnet%20TEW-821DAP&amp;severity=high&amp;id=69f5a639cbff5d8610ad4fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7606-insufficient-verification-of-data-au-2c7f577b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7606%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20TRENDnet%20TEW-821DAP&amp;severity=medium&amp;id=69f5a639cbff5d8610ad4fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7649-cwe-89-improper-neutralization-of-sp-4267a89f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7649%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20ARMember%20%E2%80%93%20Membership%20Plugin%2C%20Content%20Restriction%2C%20Member%20Levels%2C%20User%20Profile%20%26%20User%20signup&amp;severity=high&amp;id=69f5a639cbff5d8610ad4fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7605-server-side-request-forgery-in-jeecg-4139cf8b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7605%3A%20Server-Side%20Request%20Forgery%20in%20JeecgBoot&amp;severity=medium&amp;id=69f59eeccbff5d8610a6dc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7647-cwe-502-deserialization-of-untrusted-5adc643a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7647%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Cozmoslabs%20Profile%20Builder%20Pro&amp;severity=high&amp;id=69f59475cbff5d86109e0a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6447-cwe-79-improper-neutralization-of-in-c95b4805</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6447%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Call%20for%20Price%20for%20WooCommerce&amp;severity=medium&amp;id=69f59475cbff5d86109e0a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6916-cwe-79-improper-neutralization-of-in-90c10e26</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6916%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Kit%20for%20Elementor%20%E2%80%93%20Powerful%20Addons%20for%20Elementor%2C%20Widgets%20%26%20Templates%20for%20WordPress&amp;severity=medium&amp;id=69f59475cbff5d86109e0a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7049-cwe-918-server-side-request-forgery--881969df</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7049%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pixelyoursite%20PixelYourSite%20Pro%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=high&amp;id=69f59475cbff5d86109e0a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6812-cwe-918-server-side-request-forgery--a30f7b17</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6812%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20deothemes%20Ona&amp;severity=medium&amp;id=69f59475cbff5d86109e0a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7604-server-side-request-forgery-in-jeecg-cc829fe3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7604%3A%20Server-Side%20Request%20Forgery%20in%20JeecgBoot&amp;severity=medium&amp;id=69f589f3cbff5d861095a07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4882-cwe-434-unrestricted-upload-of-file--0d013f12</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4882%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WPEverest%20User%20Registration%20Advanced%20Fields&amp;severity=critical&amp;id=69f589f3cbff5d861095a05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6446-cwe-522-insufficiently-protected-cre-2d1a5149</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6446%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20bplugins%20My%20Social%20Feeds%20%E2%80%93%20Social%20Feeds%20Embedder%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69f589f3cbff5d861095a060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6963-cwe-862-missing-authorization-in-sha-3101c5b9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6963%3A%20CWE-862%20Missing%20Authorization%20in%20shahariaazam%20WP%20Mail%20Gateway&amp;severity=high&amp;id=69f589f3cbff5d861095a068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14726-cwe-200-exposure-of-sensitive-infor-ba1b62d4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14726%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20trustindex%20Widgets%20for%20Social%20Photo%20Feed&amp;severity=medium&amp;id=69f589f3cbff5d861095a04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4658-cwe-79-improper-neutralization-of-in-6f98ece0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4658%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=69f589f3cbff5d861095a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7641-cwe-269-improper-privilege-managemen-9c7b2fe2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7641%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=high&amp;id=69f589f3cbff5d861095a087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7458-cwe-288-authentication-bypass-using--78b8e551</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7458%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20pickplugins%20User%20Verification%20by%20PickPlugins&amp;severity=critical&amp;id=69f589f3cbff5d861095a070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7603-server-side-request-forgery-in-jeecg-80a2f61d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7603%3A%20Server-Side%20Request%20Forgery%20in%20JeecgBoot&amp;severity=medium&amp;id=69f589f3cbff5d861095a077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7209-cwe-79-improper-neutralization-of-in-3ce3e468</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7209%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=medium&amp;id=69f57840cbff5d861067b4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7638-cwe-639-authorization-bypass-through-e267a803</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7638%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20appcheap%20App%20Builder%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Flight&amp;severity=medium&amp;id=69f57840cbff5d861067b4e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6378-cwe-79-improper-neutralization-of-in-95ad72e3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ckp267%20MaxiBlocks%20Builder%20%7C%2017%2C000%2B%20Design%20Assets%2C%20Patterns%2C%20Icons%20%26%20Starter%20Sites&amp;severity=medium&amp;id=69f57840cbff5d861067b4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7602-improper-authorization-in-jeecgboot-f197ea4b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7602%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=69f57840cbff5d861067b4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7601-denial-of-service-in-open5gs-b2ce7783</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7601%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f56a39cbff5d86102c6868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-43824-cwe-212-improper-removal-of-sensiti-5eb1043e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-43824%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20argoproj%20Argo%20CD&amp;severity=high&amp;id=69f55c1ecbff5d8610f6d5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7600-os-command-injection-in-artmin96-yii-1bcb3b5c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7600%3A%20OS%20Command%20Injection%20in%20ArtMin96%20yii2-mcp-server&amp;severity=medium&amp;id=69f543a2cbff5d8610975999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-05-03-8a65ebff</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-05-03&amp;severity=medium&amp;id=69f752d3cbff5d8610066d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-05-02-85f6d6b5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-05-02&amp;severity=medium&amp;id=69f69176cbff5d861040b7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-05-02-4c09b511</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-05-02&amp;severity=low&amp;id=69f5a5eacbff5d8610ace05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7599-path-traversal-in-dayoooun-hwpx-mcp-382cde3a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7599%3A%20Path%20Traversal%20in%20Dayoooun%20hwpx-mcp&amp;severity=medium&amp;id=69f523decbff5d861069ef75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7598-integer-overflow-in-libssh2-5aa86104</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7598%3A%20Integer%20Overflow%20in%20libssh2&amp;severity=medium&amp;id=69f51cd7cbff5d861061b000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7597-deserialization-in-mem0ai-mem0-601a8858</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7597%3A%20Deserialization%20in%20mem0ai%20mem0&amp;severity=medium&amp;id=69f51cd7cbff5d861061aff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7596-cross-site-scripting-in-nextlevelbui-8679ab14</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7596%3A%20Cross%20Site%20Scripting%20in%20nextlevelbuilder%20ui-ux-pro-max-skill&amp;severity=medium&amp;id=69f51973cbff5d86105f6c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7595-code-injection-in-nextlevelbuilder-u-a4cf4fdc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7595%3A%20Code%20Injection%20in%20nextlevelbuilder%20ui-ux-pro-max-skill&amp;severity=medium&amp;id=69f5124bcbff5d86105840fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39805-cwe-444-inconsistent-interpretation-311f7365</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39805%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20mtrudel%20bandit&amp;severity=medium&amp;id=69f5124bcbff5d86105840de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39804-cwe-770-allocation-of-resources-wit-b21fc525</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39804%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20mtrudel%20bandit&amp;severity=high&amp;id=69f5124bcbff5d86105840d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39807-cwe-807-reliance-on-untrusted-input-cd5377cd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39807%3A%20CWE-807%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20mtrudel%20bandit&amp;severity=medium&amp;id=69f5124bcbff5d86105840e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42786-cwe-770-allocation-of-resources-wit-56eb6fa8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42786%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20mtrudel%20bandit&amp;severity=high&amp;id=69f5124bcbff5d86105840ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42788-cwe-770-allocation-of-resources-wit-033457dc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42788%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20mtrudel%20bandit&amp;severity=medium&amp;id=69f5124bcbff5d86105840f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7594-path-traversal-in-flux159-mcp-game-a-25851f15</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7594%3A%20Path%20Traversal%20in%20Flux159%20mcp-game-asset-gen&amp;severity=medium&amp;id=69f5124bcbff5d86105840f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7593-os-command-injection-in-sunwood-ai-l-deeb59c6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7593%3A%20OS%20Command%20Injection%20in%20Sunwood-ai-labs%20command-executor-mcp-server&amp;severity=medium&amp;id=69f50ec7cbff5d861053e786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7592-sql-injection-in-itsourcecode-courie-5d5ddf3b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7592%3A%20SQL%20Injection%20in%20itsourcecode%20Courier%20Management%20System&amp;severity=medium&amp;id=69f507c0cbff5d86104ab796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-ad-for-homebrew-leads-to-macsync-stealer-17af3297</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Ad%20for%20Homebrew%20Leads%20to%20MacSync%20Stealer%2C%20(Fri%2C%20May%201st)&amp;severity=medium&amp;id=69f4f9b4cbff5d86103ca594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7591-sql-injection-in-timbroddin-astro-mc-bae5e605</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7591%3A%20SQL%20Injection%20in%20TimBroddin%20astro-mcp-server&amp;severity=medium&amp;id=69f4f9becbff5d86103ca76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7590-os-command-injection-in-eyal-gor-p69-9fa3c6f7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7590%3A%20OS%20Command%20Injection%20in%20eyal-gor%20p_69_branch_monkey_mcp&amp;severity=medium&amp;id=69f4f9becbff5d86103ca768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7589-path-traversal-in-ghantakiran-splunk-40a0762e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7589%3A%20Path%20Traversal%20in%20ghantakiran%20splunk-mcp-integration&amp;severity=medium&amp;id=69f4f62dcbff5d861037bc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35233-an-unprivileged-attacker-can-craft--21c9a02e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35233%3A%20An%20unprivileged%20attacker%20can%20craft%20a%20user-space%20process%20with%20a%20malicious%20ELF%20binary%20containing%20an%20out-of-range%20sh_link%20field.%20When%20root-level%20dtrace%20attaches%20to%20--%20or%20instruments%20--%20that%20process%20(via%20dtrace%20-p%20%2C%20pid%20probes%2C%20or%20USDT)%2C%20the%20ELF%20parser%20reads%20heap%20memory%20beyond%20the%20allocated%20section%20cache%20array%20without%20any%20bounds%20check.%20This%20results%20in%20an%20uninitialized%2Fout-of-bounds%20heap%20read%20that%20can%20cause%20a%20NULL%20pointer%20dereference%20crash%20of%20the%20dtrace%20process%20(DoS)%2C%20or%20--%20depending%20on%20heap%20layout%20--%20a%20read-then-use%20of%20a%20garbage%20pointer%20controlled%20by%20adjacent%20allocations%2C%20providing%20a%20foothold%20toward%20further%20exploitation%20in%20a%20privileged%20context.%20in%20Oracle%20Corporation%20Oracle%20Linux&amp;severity=medium&amp;id=69f4ef6ecbff5d8610306921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvester-apt-group-expands-toolset-with-new-gogra-deaf49c8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvester%3A%20APT%20Group%20Expands%20Toolset%20With%20New%20GoGra%20Linux%20Backdoor&amp;severity=medium&amp;id=69f8af02cbff5d86102ac3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21996-an-unprivileged-attacker-can-reliab-153917bf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21996%3A%20An%20unprivileged%20attacker%20can%20reliably%20trigger%20a%20crash%20of%20the%20dtrace%20process%20with%20a%20malicious%20ELF%20binary%20due%20to%20an%20integer%20Divide-by-Zero%20in%20Pbuild_file_symtab()%20in%20Oracle%20Corporation%20Oracle%20Linux&amp;severity=low&amp;id=69f4ef6ecbff5d861030691a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7588-path-traversal-in-ggerve-coding-stan-e712f585</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7588%3A%20Path%20Traversal%20in%20ggerve%20coding-standards-mcp&amp;severity=medium&amp;id=69f4ef6ecbff5d8610306924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7587-denial-of-service-in-open5gs-91303e6d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7587%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f4dd93cbff5d861017cf87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23866-improper-verification-of-source-of--b210baca</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23866%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20(CWE-940)%20in%20Facebook%20WhatsApp%20for%20Android&amp;severity=medium&amp;id=69f4d323cbff5d861010f924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23863-improper-neutralization-of-null-byt-bd9ffa4d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23863%3A%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20(CWE-158)%20in%20Facebook%20WhatsApp%20Desktop%20for%20Windows&amp;severity=medium&amp;id=69f4d323cbff5d861010f920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7586-denial-of-service-in-open5gs-393b449f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7586%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f4d323cbff5d861010f92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22166-cwe-416-use-after-free-in-imaginati-8c251060</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22166%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69f4d323cbff5d861010f91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22165-cwe-416-use-after-free-in-imaginati-2f3899a7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22165%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69f4d323cbff5d861010f917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22167-cwe-cwe-119-improper-restriction-of-9bef233b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22167%3A%20CWE%20-%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69f4d323cbff5d861010f91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7585-denial-of-service-in-open5gs-9d78bb06</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7585%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f4c881cbff5d8610019a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-scattered-spider-hacker-arrested-soc-05bb60d4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Scattered%20Spider%20Hacker%20Arrested%2C%20SOC%20Effectiveness%20Metrics%2C%20NSA%20Tool%20Vulnerability&amp;severity=medium&amp;id=69f4c16ecbff5d8610f92858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7583-denial-of-service-in-open5gs-925c5bb3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7583%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f4c17bcbff5d8610f92aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-adjusts-bug-bounties-chrome-payouts-drop-as-17c5afb2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Adjusts%20Bug%20Bounties%3A%20Chrome%20Payouts%20Drop%20as%20Android%20Rewards%20Rise%20Amid%20AI%20Surge&amp;severity=medium&amp;id=69f4ba66cbff5d8610f04dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7582-out-of-bounds-write-in-academysoftwa-d2482829</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7582%3A%20Out-of-bounds%20Write%20in%20AcademySoftwareFoundation%20OpenImageIO&amp;severity=medium&amp;id=69f4b73ecbff5d8610ec598b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3143-cwe-862-missing-authorization-in-bol-128bbcd5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3143%3A%20CWE-862%20Missing%20Authorization%20in%20boldgrid%20Total%20Upkeep%20%E2%80%93%20WordPress%20Backup%20Plugin%20plus%20Restore%20%26%20Migrate%20by%20BoldGrid&amp;severity=medium&amp;id=69f4afdccbff5d8610e19ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7581-permissive-cross-domain-policy-with--4e949221</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7581%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20alexta69%20MeTube&amp;severity=medium&amp;id=69f4a54ecbff5d8610d4f562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7580-code-injection-in-exiftool-633bc8ee</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7580%3A%20Code%20Injection%20in%20Exiftool&amp;severity=medium&amp;id=69f500b7cbff5d86104519f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-us-security-experts-sentenced-to-prison-for-he-8cf9057a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20US%20Security%20Experts%20Sentenced%20to%20Prison%20for%20Helping%20Ransomware%20Gang&amp;severity=medium&amp;id=69f493bacbff5d8610c4806b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7579-hard-coded-credentials-in-astrbotdev-d67982ad</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7579%3A%20Hard-coded%20Credentials%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69f493c1cbff5d8610c483ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3140-cwe-352-cross-site-request-forgery-c-05a71552</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3140%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20davidvongries%20Ultimate%20Dashboard%20%E2%80%93%20Custom%20WordPress%20Dashboard&amp;severity=medium&amp;id=69f493c1cbff5d8610c483a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3772-cwe-352-cross-site-request-forgery-c-7c76c8b9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3772%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20benjaminprojas%20WP%20Editor&amp;severity=high&amp;id=69f493c1cbff5d8610c483a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-deepdoor-backdoor-enables-espionage--1d32315d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20Deep%23Door%20Backdoor%20Enables%20Espionage%2C%20Disruption&amp;severity=medium&amp;id=69f48cf4cbff5d8610bc69eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7578-unrestricted-upload-in-maccms-pro-9f29cbb7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7578%3A%20Unrestricted%20Upload%20in%20MacCMS%20Pro&amp;severity=medium&amp;id=69f485abcbff5d8610b3fa63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-releases-open-source-tool-for-ai-model-prove-46300c67</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Releases%20Open%20Source%20Tool%20for%20AI%20Model%20Provenance&amp;severity=medium&amp;id=69f47eb6cbff5d8610ae1036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42778-cwe-502-deserialization-of-untruste-db0b103e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42778%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20MINA&amp;severity=critical&amp;id=69f47ec1cbff5d8610ae12c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42779-cwe-502-deserialization-of-untruste-d7661188</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42779%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20MINA&amp;severity=critical&amp;id=69f47ec1cbff5d8610ae12c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42404-cwe-918-server-side-request-forgery-f462c99d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42404%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Neethi&amp;severity=medium&amp;id=69f47ec1cbff5d8610ae12bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7567-cwe-288-authentication-bypass-using--caa3dd82</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7567%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20elemntor%20Temporary%20Login&amp;severity=critical&amp;id=69f4779bcbff5d8610a57434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42402-cwe-400-uncontrolled-resource-consu-a80f47df</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42402%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Neethi&amp;severity=high&amp;id=69f470b4cbff5d86109fcd0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mini-shai-hulud-spreads-to-packagist-malicious-int-5723f86a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mini%20Shai-Hulud%20Spreads%20to%20Packagist%3A%20Malicious%20Intercom%20PHP%20Package%20Follows%20npm%20Compromise&amp;severity=medium&amp;id=69f8ab67cbff5d8610291231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hugging-face-clawhub-abused-for-malware-distributi-d4fbf0df</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hugging%20Face%2C%20ClawHub%20Abused%20for%20Malware%20Distribution&amp;severity=medium&amp;id=69f4698acbff5d861096edcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42403-cwe-400-uncontrolled-resource-consu-c3d0cab0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42403%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Neethi&amp;severity=high&amp;id=69f470b4cbff5d86109fcd0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40201-cwe-79-improper-neutralization-of-i-fdafaf42</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40201%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20diplodoc-platform%20%40diplodoc%2Fsearch-extension&amp;severity=medium&amp;id=69f470b4cbff5d86109fcd07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-surge-in-hacker-enabled-cargo-theft-bbac4a3c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Surge%20in%20Hacker-Enabled%20Cargo%20Theft&amp;severity=medium&amp;id=69f462a2cbff5d861090220d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1800-hit-in-mini-shai-hulud-attack-on-sap-lightnin-e41e5067</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1%2C800%20Hit%20in%20Mini%20Shai-Hulud%20Attack%20on%20SAP%2C%20Lightning%2C%20Intercom&amp;severity=medium&amp;id=69f457f6cbff5d861086a5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7584-cwe-502-deserialization-of-untrusted-3a9a6f64</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7584%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Zurich%20Instruments%20LabOne%20Q&amp;severity=high&amp;id=69f45b7bcbff5d861089342d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7555-sql-injection-in-itsourcecode-electr-dcc013bf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7555%3A%20SQL%20Injection%20in%20itsourcecode%20Electronic%20Judging%20System&amp;severity=medium&amp;id=69f43f5bcbff5d86106a078f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13362-cwe-79-improper-neutralization-of-i-44d997b2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sebet%20Go%20Fetch%20Jobs%20(for%20WP%20Job%20Manager)&amp;severity=medium&amp;id=69f43f5bcbff5d86106a0764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6127-cwe-79-improper-neutralization-of-in-4781251b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=69f43f5bcbff5d86106a077e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7554-weak-password-recovery-in-d-link-m60-0475af31</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7554%3A%20Weak%20Password%20Recovery%20in%20D-Link%20M60&amp;severity=medium&amp;id=69f43f5bcbff5d86106a0788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42994-cwe-78-improper-neutralization-of-s-70529260</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42994%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Bitwarden%20Bitwarden%20CLI&amp;severity=high&amp;id=69f42dc9cbff5d861040e106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7553-sql-injection-in-code-projects-gym-m-132e5d51</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7553%3A%20SQL%20Injection%20in%20code-projects%20Gym%20Management%20System&amp;severity=medium&amp;id=69f42dc9cbff5d861040e117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7550-sql-injection-in-sourcecodester-phar-5a38a7ee</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7550%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f42dc9cbff5d861040e110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7549-sql-injection-in-sourcecodester-phar-0f2d28c6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7549%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f42dc9cbff5d861040e109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7548-command-injection-in-totolink-nr1800-9109fa5c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7548%3A%20Command%20Injection%20in%20Totolink%20NR1800X&amp;severity=high&amp;id=69f41c7ccbff5d86102583bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7546-stack-based-buffer-overflow-in-totol-717d05bc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7546%3A%20Stack-based%20Buffer%20Overflow%20in%20Totolink%20NR1800X&amp;severity=critical&amp;id=69f41c7ccbff5d86102583b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-friday-may-1st-2026-httpsiscsans-ee568f51</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Friday%2C%20May%201st%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9914%2C%20(Fri%2C%20May%201st)&amp;severity=medium&amp;id=69f40a9fcbff5d86100cf3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7545-sql-injection-in-sourcecodester-adva-4f17313b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7545%3A%20SQL%20Injection%20in%20SourceCodester%20Advanced%20School%20Management%20System&amp;severity=medium&amp;id=69f40aa7cbff5d86100cf5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7538-os-command-injection-in-totolink-a80-28438d15</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7538%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f40aa7cbff5d86100cf5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7536-denial-of-service-in-open5gs-d10c56d5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7536%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f40aa7cbff5d86100cf5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7535-denial-of-service-in-open5gs-dc1af87b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7535%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f40044cbff5d8610f61ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7519-path-traversal-in-fujian-apex-livebo-e1bae231</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7519%3A%20Path%20Traversal%20in%20Fujian%20Apex%20LiveBOS&amp;severity=medium&amp;id=69f40044cbff5d8610f61ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7518-denial-of-service-in-open5gs-5307949c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7518%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f40044cbff5d8610f61ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-05-02-2bdd0599</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-05-02&amp;severity=medium&amp;id=69f5aa36cbff5d8610b04e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-05-01-eef90b3d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-05-01&amp;severity=medium&amp;id=69f53ff6cbff5d8610859aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30363-na-fa7c548d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30363%3A%20n%2Fa&amp;severity=high&amp;id=69f4f9becbff5d86103ca764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52347-na-a5f99856</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52347%3A%20n%2Fa&amp;severity=high&amp;id=69f4f62dcbff5d861037bc86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26461-na-caa0e5b2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26461%3A%20n%2Fa&amp;severity=medium&amp;id=69f4ef6ecbff5d861030691d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69606-na-f743a984</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69606%3A%20n%2Fa&amp;severity=medium&amp;id=69f4ef6ecbff5d8610306915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37457-na-952ce403</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37457%3A%20n%2Fa&amp;severity=high&amp;id=69f4e81bcbff5d861026ece9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63548-na-192e3e8f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63548%3A%20n%2Fa&amp;severity=high&amp;id=69f4e81bcbff5d861026ece5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63547-na-332110e9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63547%3A%20n%2Fa&amp;severity=high&amp;id=69f4e81bcbff5d861026ece0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42469-na-489c1776</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42469%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd93cbff5d861017cf84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42468-na-11fef5b2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42468%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42467-na-dca41e5b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42467%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37541-na-4bb36f9d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37541%3A%20n%2Fa&amp;severity=critical&amp;id=69f4dd91cbff5d861017cf40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37540-na-41a9c939</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37540%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37539-na-ee89ba60</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37539%3A%20n%2Fa&amp;severity=critical&amp;id=69f4dd91cbff5d861017cf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37538-na-de3f64a9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37538%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37537-na-69c85d75</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37537%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37536-na-f0c8d67b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37536%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37535-na-1a1cf7b8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37535%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37534-na-40fe56fb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37534%3A%20n%2Fa&amp;severity=critical&amp;id=69f4dd91cbff5d861017cf1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42485-na-436adebf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42485%3A%20n%2Fa&amp;severity=high&amp;id=69f4d687cbff5d861013603e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37532-na-a8069f0f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37532%3A%20n%2Fa&amp;severity=high&amp;id=69f4d687cbff5d861013603a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37531-na-02aa37b3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37531%3A%20n%2Fa&amp;severity=critical&amp;id=69f4d687cbff5d8610136036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37530-na-18dfcd93</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37530%3A%20n%2Fa&amp;severity=high&amp;id=69f4d687cbff5d8610136032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37526-na-55da17ab</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37526%3A%20n%2Fa&amp;severity=high&amp;id=69f4d687cbff5d861013602e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37525-na-d4b603db</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37525%3A%20n%2Fa&amp;severity=high&amp;id=69f4d687cbff5d861013602a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37554-na-b632be68</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37554%3A%20n%2Fa&amp;severity=high&amp;id=69f4d323cbff5d861010f928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42475-na-3867f6d5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42475%3A%20n%2Fa&amp;severity=medium&amp;id=69f4cbfccbff5d8610073140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42474-na-61d12114</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42474%3A%20n%2Fa&amp;severity=medium&amp;id=69f4cbfccbff5d861007313b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42473-na-1e6bc7dd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42473%3A%20n%2Fa&amp;severity=critical&amp;id=69f4cbfccbff5d8610073136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42472-na-c6791b54</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42472%3A%20n%2Fa&amp;severity=critical&amp;id=69f4cbfccbff5d8610073131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42471-na-65690423</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42471%3A%20n%2Fa&amp;severity=high&amp;id=69f4cbfccbff5d861007312c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37552-na-983fd57a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37552%3A%20n%2Fa&amp;severity=high&amp;id=69f4cbfccbff5d8610073127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37505-na-ed6ef807</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37505%3A%20n%2Fa&amp;severity=medium&amp;id=69f4cbfccbff5d8610073123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42481-na-2003877f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42481%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c881cbff5d8610019a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42480-na-eeee3673</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42480%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c881cbff5d8610019a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37504-na-eeef9ac0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37504%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c881cbff5d8610019a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37503-na-a8fc6324</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37503%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c881cbff5d8610019a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42479-na-6294dbfc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42479%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c17bcbff5d8610f92aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42478-na-d546ec32</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42478%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c17bcbff5d8610f92aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42477-na-1f7fb1a5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42477%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c17bcbff5d8610f92aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42476-na-15f22730</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42476%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c17bcbff5d8610f92aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42484-na-7ae4572a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42484%3A%20n%2Fa&amp;severity=critical&amp;id=69f4b73ecbff5d8610ec5988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42483-na-ec68fb85</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42483%3A%20n%2Fa&amp;severity=high&amp;id=69f4b73ecbff5d8610ec5985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42482-na-e7fd29fb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42482%3A%20n%2Fa&amp;severity=high&amp;id=69f4b73ecbff5d8610ec5982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-43003-cwe-829-inclusion-of-functionality--0e871313</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-43003%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20OpenStack%20ironic-python-agent&amp;severity=high&amp;id=69f46607cbff5d861092e804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-43001-cwe-863-incorrect-authorization-in--67edec26</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-43001%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenStack%20Keystone&amp;severity=high&amp;id=69f46607cbff5d861092e800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-05-01-128a9787</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-05-01&amp;severity=low&amp;id=69f3f903cbff5d8610de00e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7513-buffer-overflow-in-utt-hiper-1200gw-f7ebfb9f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7513%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201200GW&amp;severity=high&amp;id=69f3eafbcbff5d8610ba40f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intercoms-npm-package-compromised-in-ongoing-mini--cf5d8369</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intercom%E2%80%99s%20npm%20Package%20Compromised%20in%20Ongoing%20Mini%20Shai-Hulud%20Worm%20Attack&amp;severity=medium&amp;id=69f8a7e0cbff5d861027fc00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-vect-ransomware-as-a-service-f9ce2ef9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20Vect%20Ransomware-as-a-Service&amp;severity=medium&amp;id=69f8a7e0cbff5d861027fc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7512-buffer-overflow-in-utt-hiper-1200gw-f79541f7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7512%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201200GW&amp;severity=high&amp;id=69f3eafbcbff5d8610ba40ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22726-cwe-923-improper-restriction-of-com-9bad7a4b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22726%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20CloudFoundry%20Foundation%20Routing%20release&amp;severity=medium&amp;id=69f3e778cbff5d8610b741a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5404-cwe-120-buffer-copy-without-checking-127fb11a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5404%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f3e778cbff5d8610b741ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5403-cwe-122-heap-based-buffer-overflow-i-0efedf3c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5403%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69f3e778cbff5d8610b741aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5656-cwe-22-improper-limitation-of-a-path-6e5274c3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5656%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69f3e778cbff5d8610b741b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5405-cwe-122-heap-based-buffer-overflow-i-e5ad6249</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5405%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69f3e778cbff5d8610b741b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7510-authorization-bypass-in-owap-defectd-0869c5a2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7510%3A%20Authorization%20Bypass%20in%20OWAP%20DefectDojo&amp;severity=medium&amp;id=69f3e0d7cbff5d8610af56cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7508-code-injection-in-bootstrap-cms-a5801659</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7508%3A%20Code%20Injection%20in%20Bootstrap%20CMS&amp;severity=medium&amp;id=69f3e0d7cbff5d8610af56c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7506-sql-injection-in-sourcecodester-hote-8822ab29</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7506%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20Management%20System&amp;severity=medium&amp;id=69f3dceccbff5d8610aa1566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7505-improper-authorization-in-nextlevelb-4cbc0357</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7505%3A%20Improper%20Authorization%20in%20nextlevelbuilder%20GoClaw&amp;severity=medium&amp;id=69f3d61dcbff5d86109e92ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28909-users-who-connect-to-malicious-regi-54d3e286</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28909%3A%20Users%20who%20connect%20to%20malicious%20registries%20with%20hostnames%20matching%20the%20bypass%20patterns%20will%20have%20their%20registry%20credentials%20exposed%20in%20plaintext.%20in%20Apple%20macOS&amp;severity=medium&amp;id=69f3d61dcbff5d86109e92eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1577-vulnerability-in-ibm-db2-3362fd99</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1577%3A%20Vulnerability%20in%20IBM%20Db2&amp;severity=medium&amp;id=69f3d25fcbff5d8610986845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36122-cwe-770-allocation-of-resources-wit-577c7c23</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36122%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2&amp;severity=medium&amp;id=69f3d25fcbff5d8610986842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14688-cwe-1284-improper-validation-of-spe-1cc722d2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14688%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2&amp;severity=medium&amp;id=69f3d25fcbff5d861098683f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7503-buffer-overflow-in-code-projects-for-724ddcd8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7503%3A%20Buffer%20Overflow%20in%20code-projects%20for%20Plugin&amp;severity=high&amp;id=69f3d25fcbff5d861098684b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2311-cwe-284-improper-access-control-c25fe9c8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2311%3A%20CWE-284%20Improper%20Access%20Control&amp;severity=medium&amp;id=69f3d25fcbff5d8610986848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7551-cwe-78-improper-neutralization-of-sp-f5ce297f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7551%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69f3cb59cbff5d86108f8849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36180-cwe-923-improper-restriction-of-com-17f6d3f7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36180%3A%20CWE-923%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20IBM%20watsonx.data&amp;severity=medium&amp;id=69f3cb59cbff5d86108f882e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6389-cwe-269-improper-privilege-managemen-d916f0a6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6389%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IBM%20Turbonomic%20prometurbo%20agent&amp;severity=high&amp;id=69f3cb59cbff5d86108f8837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6542-cwe-639-authorization-bypass-through-2c9318eb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6542%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20Langflow%20OSS&amp;severity=medium&amp;id=69f3cb59cbff5d86108f883a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7502-authorization-bypass-in-linkstackorg-68359b4f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7502%3A%20Authorization%20Bypass%20in%20LinkStackOrg%20LinkStack&amp;severity=medium&amp;id=69f3cb59cbff5d86108f8840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36335-cwe-256-plaintext-storage-of-a-pass-e5cac996</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36335%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20IBM%20watsonx.data%20intelligence&amp;severity=medium&amp;id=69f3cb59cbff5d86108f8831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6543-cwe-94-improper-control-of-generatio-3e8e7b51</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6543%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20IBM%20Langflow%20Desktop&amp;severity=high&amp;id=69f3cb59cbff5d86108f883d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3345-cwe-22-improper-limitation-of-a-path-18f8fbeb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3345%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Langflow%20Desktop&amp;severity=medium&amp;id=69f3cb59cbff5d86108f8834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3346-cwe-89-improper-neutralization-of-sp-675ba312</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3346%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Langflow%20Desktop&amp;severity=medium&amp;id=69f3c7f3cbff5d86108d5843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3340-cwe-918-server-side-request-forgery--11ca7bc5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3340%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Langflow%20Desktop&amp;severity=medium&amp;id=69f3c7f3cbff5d86108d5840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4502-cwe-22-improper-limitation-of-a-path-4fc3e337</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4502%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Langflow%20Desktop&amp;severity=medium&amp;id=69f3c7f3cbff5d86108d5846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4503-cwe-639-authorization-bypass-through-2bd29972</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4503%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20Langflow%20Desktop&amp;severity=high&amp;id=69f3c7f3cbff5d86108d5849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7501-cross-site-scripting-in-linkstackorg-1043a0bd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7501%3A%20Cross%20Site%20Scripting%20in%20LinkStackOrg%20LinkStack&amp;severity=medium&amp;id=69f3c7f3cbff5d86108d584c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40951-vulnerability-in-absolute-software--c2b5bc8e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40951%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=medium&amp;id=69f3c0cccbff5d861086a35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40950-vulnerability-in-absolute-software--c38f7f38</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40950%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=high&amp;id=69f3c0cccbff5d861086a35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28532-cwe-190-integer-overflow-or-wraparo-99967126</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28532%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20FRRouting%20frr&amp;severity=medium&amp;id=69f3b9c5cbff5d8610805806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40949-vulnerability-in-absolute-software--870f9917</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40949%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=medium&amp;id=69f3b9c5cbff5d8610805818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33452-vulnerability-in-absolute-software--40f0e070</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33452%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=medium&amp;id=69f3b9c5cbff5d8610805815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7435-cwe-89-improper-neutralization-of-sp-3825a86a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7435%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20siteserver%20SSCMS&amp;severity=high&amp;id=69f3b9c5cbff5d861080581b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33451-vulnerability-in-absolute-software--1d1e357a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33451%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=high&amp;id=69f3b9c5cbff5d8610805812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33450-vulnerability-in-absolute-software--525608f0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33450%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=low&amp;id=69f3b9c5cbff5d861080580f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33449-vulnerability-in-absolute-software--ea5fd6e2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33449%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=low&amp;id=69f3b9c5cbff5d861080580c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33448-vulnerability-in-absolute-software--ff210aff</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33448%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=medium&amp;id=69f3b63fcbff5d86107c4f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7429-cwe-79-improper-neutralization-of-in-8e6b4acc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siteserver%20SSCMS&amp;severity=low&amp;id=69f3b63fcbff5d86107c4f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33447-vulnerability-in-absolute-software--b6ed6176</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33447%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=low&amp;id=69f3b63fcbff5d86107c4f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33446-vulnerability-in-absolute-software--72018345</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33446%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=low&amp;id=69f3b63fcbff5d86107c4f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pypi-package-compromised-in-supply-chain-attack-bd5000b9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PyPI%20Package%20Compromised%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69f8a7e0cbff5d861027fc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-unveils-claude-security-to-counter-ai-po-3ad1de36</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20Unveils%20Claude%20Security%20to%20Counter%20AI-Powered%20Exploit%20Surge&amp;severity=medium&amp;id=69f3a82fcbff5d86106e78e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-fuels-industrial-cybercrime-as-time-to-exploit--feddc4dd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Fuels%20%E2%80%98Industrial%E2%80%99%20Cybercrime%20as%20Time-to-Exploit%20Shrinks%20to%20Hours&amp;severity=medium&amp;id=69f3a82fcbff5d86106e78e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7461-cwe-78-improper-neutralization-of-sp-8ab43a86</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7461%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20AWS%20Amazon%20ECS%20Agent&amp;severity=high&amp;id=69f3a4adcbff5d8610696812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32148-cwe-354-improper-validation-of-inte-978f90e2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32148%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20hexpm%20hex&amp;severity=high&amp;id=69f3a4adcbff5d861069680c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33845-integer-underflow-wrap-or-wraparoun-69bead90</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33845%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)&amp;severity=high&amp;id=69f3969dcbff5d8610590846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3832-incorrect-behavior-order-early-valid-2a718fff</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3832%3A%20Incorrect%20Behavior%20Order%3A%20Early%20Validation&amp;severity=low&amp;id=69f3969dcbff5d861059085c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3833-improper-handling-of-case-sensitivit-2fa6397a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3833%3A%20Improper%20Handling%20of%20Case%20Sensitivity&amp;severity=medium&amp;id=69f3969dcbff5d8610590861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71284-improper-neutralization-of-special--e063f565</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71284%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Synway%20Information%20Engineering%20Co.%2C%20Ltd.%20Synway%20SMG%20Gateway%20Management%20Software&amp;severity=critical&amp;id=69f3888dcbff5d861048853f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14543-cwe-611-improper-restriction-of-xml-8276036a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14543%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=69f376fbcbff5d86103580ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5174-cwe-20-improper-input-validation-in--1f9b9c61</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5174%3A%20CWE-20%20Improper%20input%20validation%20in%20Progress%20Software%20MOVEit%20Automation&amp;severity=high&amp;id=69f376fbcbff5d86103580db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4670-cwe-305-authentication-bypass-by-pri-dff96cb4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4670%3A%20CWE-305%20Authentication%20bypass%20by%20primary%20weakness%20in%20Progress%20Software%20MOVEit%20Automation&amp;severity=critical&amp;id=69f376fbcbff5d86103580d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7500-direct-request-forced-browsing-in-re-08155124</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7500%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69f37003cbff5d86102de4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-urges-immediate-patching-of-firewall-vul-e7012ffc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Urges%20Immediate%20Patching%20of%20Firewall%20Vulnerabilities&amp;severity=medium&amp;id=69f36feecbff5d86102d498a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-removes-your-background-but-leaves-the-ma-5a182169</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Removes%20Your%20Background%20but%20Leaves%20the%20Malware&amp;severity=medium&amp;id=69f884b6cbff5d86101065e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-npm-packages-targeted-in-supply-chain-attack-2a7d363e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20NPM%20Packages%20Targeted%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69f368e6cbff5d8610edbc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-in-depth-analysis-of-novel-karstorat-malware-8e14d4d4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20In-Depth%20Analysis%20of%20Novel%20KarstoRAT%20Malware&amp;severity=medium&amp;id=69f884b6cbff5d86101065fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/say-my-name-how-miolab-is-building-macos-stealer-e-c154d768</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CSay%20My%20Name%E2%80%9D%3A%20How%20MioLab%20is%20building%20MacOS%20Stealer%20Empire&amp;severity=medium&amp;id=69f884b6cbff5d861010660c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2892-cwe-285-improper-authorization-in-th-fa4e8141</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2892%3A%20CWE-285%20Improper%20Authorization%20in%20themeisle%20Otter%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=high&amp;id=69f365d8cbff5d8610ec5024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7163-cleartext-storage-of-sensitive-infor-7973e159</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7163%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Red%20Hat%20multicluster%20engine%20for%20Kubernetes%202.1&amp;severity=medium&amp;id=69f365d8cbff5d8610ec502b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7246-cwe-77-improper-neutralization-of-sp-f44b314d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7246%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Pallets%20Click%20Click&amp;severity=high&amp;id=69f365d8cbff5d8610ec502f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7402-cwe-799-improper-control-of-interact-3b8b7176</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7402%3A%20CWE-799%20Improper%20Control%20of%20Interaction%20Frequency%20in%20MeWare%20Software%20Development%20Inc.%20PDKS&amp;severity=high&amp;id=69f407bccbff5d86100b0c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14576-cwe-94-improper-control-of-generati-31c59250</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14576%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20The%20Qt%20Company%20Qt&amp;severity=high&amp;id=69f407bccbff5d86100b0c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7399-cwe-639-authorization-bypass-through-86a7e73f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7399%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20MeWare%20Software%20Development%20Inc.%20PDKS&amp;severity=high&amp;id=69f407bccbff5d86100b0c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7382-cwe-200-exposure-of-sensitive-inform-6cd51947</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7382%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MeWare%20Software%20Development%20Inc.%20PDKS&amp;severity=medium&amp;id=69f407bccbff5d86100b0c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-gemini-cli-flaw-enabled-host-code-executi-aed1597d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Gemini%20CLI%20Flaw%20Enabled%20Host%20Code%20Execution%2C%20Supply%20Chain%20Attacks&amp;severity=critical&amp;id=69f34cc6cbff5d8610dc5876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13971-cwe-611-improper-restriction-of-xml-6ac9aea8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13971%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Lobster%20GmbH%20Lobster_pro&amp;severity=high&amp;id=69f407bbcbff5d86100b0c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/enocean-smartserver-flaws-expose-buildings-to-remo-e3c7cc71</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EnOcean%20SmartServer%20Flaws%20Expose%20Buildings%20to%20Remote%20Hacking&amp;severity=critical&amp;id=69f345bfcbff5d8610d8a53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5080-cwe-340-generation-of-predictable-nu-fb2c89e3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5080%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20BIGPRESH%20Dancer%3A%3ASession%3A%3AAbstract&amp;severity=medium&amp;id=69f3499ecbff5d8610da76f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1493-cwe-79-improper-neutralization-of-in-d3d22865</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1493%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wolters%20Kluwer%20Polska%20LEX%20Baza%20Dokument%C3%B3w&amp;severity=medium&amp;id=69f3423bcbff5d8610d6429c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-cpanel-whm-vulnerability-exploited-as-zer-3ad225d7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20cPanel%20%26%20WHM%20Vulnerability%20Exploited%20as%20Zero-Day%20for%20Months&amp;severity=critical&amp;id=69f33b32cbff5d8610cfce46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41882-cwe-59-in-jetbrains-intellij-idea-5e81e09a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41882%3A%20CWE-59%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=high&amp;id=69f3423bcbff5d8610d642a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copy-fail-logic-flaw-in-linux-kernel-enables-syste-6fa15d44</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Copy%20Fail%E2%80%99%20Logic%20Flaw%20in%20Linux%20Kernel%20Enables%20System%20Takeover&amp;severity=medium&amp;id=69f3299dcbff5d8610c1c55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-uses-the-new-abcdoor-backdoor-to-target-bdd96446</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20uses%20the%20new%20ABCDoor%20backdoor%20to%20target%20organizations%20in%20Russia%20and%20India&amp;severity=medium&amp;id=69f87a33cbff5d861007009c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6498-cwe-345-insufficient-verification-of-cb283348</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6498%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20rustaurius%20Five%20Star%20Restaurant%20Reservations%20%E2%80%93%20WordPress%20Booking%20Plugin&amp;severity=medium&amp;id=69f3499ecbff5d8610da76fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41016-cwe-295-improper-certificate-valida-dd092550</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41016%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20SMTP&amp;severity=medium&amp;id=69f407bccbff5d86100b0c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42800-cwe-476-null-pointer-dereference-in-75177655</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42800%3A%20CWE-476%20NULL%20pointer%20dereference%20in%20ASR%20Lapwing_Linux&amp;severity=high&amp;id=69f407bccbff5d86100b0c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42799-cwe-125-out-of-bounds-read-in-asr-k-aa688f05</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42799%3A%20CWE-125%20Out-of-bounds%20read%20in%20ASR%20Kestrel&amp;severity=high&amp;id=69f407bccbff5d86100b0c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sandhills-medical-says-ransomware-breach-affects-1-1b6fe2f8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sandhills%20Medical%20Says%20Ransomware%20Breach%20Affects%20170%2C000&amp;severity=medium&amp;id=69f31485cbff5d8610ac022f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22070-cwe-23-relative-path-traversal-in-o-e4705852</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22070%3A%20CWE-23%20Relative%20path%20traversal%20in%20OPPO%20ColorOS%20Assistant&amp;severity=high&amp;id=69f407bccbff5d86100b0c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39847-cwe-611-improper-restriction-of-xml-9cb9cb53</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39847%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%204D%204D%20Server&amp;severity=high&amp;id=69f30313cbff5d86109ddf12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42798-cwe-190-integer-overflow-or-wraparo-054c7fc1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42798%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20littlecms%20little%20cms%20color%20engine&amp;severity=medium&amp;id=69f30313cbff5d86109ddf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41226-url-redirection-to-untrusted-site-o-783833fa</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41226%3A%20URL%20redirection%20to%20untrusted%20site%20(&apos;Open%20Redirect&apos;)%20in%20Ricoh%20Company%2C%20Ltd.%20Multiple%20laser%20printers%20and%20MFPs%20which%20implement%20Web%20Image%20Monitor&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5409-cwe-674-uncontrolled-recursion-in-wi-23154b63</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5409%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5408-cwe-674-uncontrolled-recursion-in-wi-29b4b29c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5408%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5406-cwe-674-uncontrolled-recursion-in-wi-397e1a7e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5406%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5407-cwe-835-loop-with-unreachable-exit-c-badb8538</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5407%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5299-cwe-674-uncontrolled-recursion-in-wi-f73b4311</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5299%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5402-cwe-122-heap-based-buffer-overflow-i-bdf27e3b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5402%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69f2f4e6cbff5d8610970aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5401-cwe-674-uncontrolled-recursion-in-wi-42982e17</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5401%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5654-cwe-121-stack-based-buffer-overflow--e52b55c6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5654%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5655-cwe-416-use-after-free-in-wireshark--2af4d3c5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5655%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5657-cwe-415-double-free-in-wireshark-fou-1c50fda0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5657%3A%20CWE-415%3A%20Double%20Free%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5653-cwe-122-heap-based-buffer-overflow-i-490bb307</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5653%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6538-cwe-121-stack-based-buffer-overflow--11149ad0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6538%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4eecbff5d8610970cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6537-cwe-121-stack-based-buffer-overflow--91da9e3d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6537%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6536-cwe-835-loop-with-unreachable-exit-c-30446055</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6536%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6535-cwe-1325-improperly-controlled-seque-ee42fe95</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6535%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6534-cwe-835-loop-with-unreachable-exit-c-5247679d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6534%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6533-cwe-1325-improperly-controlled-seque-ca798bb1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6533%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6532-cwe-126-buffer-over-read-in-wireshar-61249fa0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6532%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6531-cwe-835-loop-with-unreachable-exit-c-fc482710</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6531%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6530-cwe-122-heap-based-buffer-overflow-i-09d5a2cf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6530%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6529-cwe-122-heap-based-buffer-overflow-i-8b582d2f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6529%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6528-cwe-835-loop-with-unreachable-exit-c-76ab2751</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6528%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6527-cwe-674-uncontrolled-recursion-in-wi-874cc945</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6527%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6526-cwe-476-null-pointer-dereference-in--e972e95a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6526%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6524-cwe-824-access-of-uninitialized-poin-cb5e2b86</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6524%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6523-cwe-835-loop-with-unreachable-exit-c-23a6b2bd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6523%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6521-cwe-835-loop-with-unreachable-exit-c-7b26e8ab</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6521%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6520-cwe-835-loop-with-unreachable-exit-c-b5b02566</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6520%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6519-cwe-835-loop-with-unreachable-exit-c-5a67a3ac</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6519%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6522-cwe-835-loop-with-unreachable-exit-c-21da26fb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6522%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6870-cwe-824-access-of-uninitialized-poin-e86ece1b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6870%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4eecbff5d8610970ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6869-cwe-1325-improperly-controlled-seque-cec808b9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6869%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4eecbff5d8610970cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6867-cwe-1325-improperly-controlled-seque-3d94f914</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6867%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4eecbff5d8610970cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6868-cwe-121-stack-based-buffer-overflow--be9f6ff5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6868%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2e6f2cbff5d861093cb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7378-cwe-122-heap-based-buffer-overflow-i-0ab50125</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7378%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2e6f2cbff5d861093cb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7379-cwe-401-missing-release-of-memory-af-9bc1ae18</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7379%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2e6f2cbff5d861093cb8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7375-cwe-835-loop-with-unreachable-exit-c-0a8efe5a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7375%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2e6f2cbff5d861093cb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7376-cwe-476-null-pointer-dereference-in--f9f71ccc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7376%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2e6f2cbff5d861093cb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13030-missing-authentication-for-critical-4e883dd9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13030%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20django-mdeditor&amp;severity=medium&amp;id=69f2e6f2cbff5d861093cb73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7470-stack-based-buffer-overflow-in-tenda-f207f452</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7470%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%204G300&amp;severity=high&amp;id=69f2c3abcbff5d861080b111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-30th-2026-httpsis-83f2ff88</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%2030th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9912%2C%20(Thu%2C%20Apr%2030th)&amp;severity=medium&amp;id=69f2b91ecbff5d86107ca0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7469-command-injection-in-tenda-4g300-14fe8e3b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7469%3A%20Command%20Injection%20in%20Tenda%204G300&amp;severity=medium&amp;id=69f2b924cbff5d86107ca1b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7468-improper-access-controls-in-1024-lab-cbc052fc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7468%3A%20Improper%20Access%20Controls%20in%201024-lab%20smart-admin&amp;severity=medium&amp;id=69f2b622cbff5d86107b2331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7447-sql-injection-in-sourcecodester-pet--cb1e26e4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7447%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=69f2b622cbff5d86107b232a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-hits-sap-cap-and-cloud-mta-npm-de579a3f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Attack%20Hits%20SAP%20CAP%20and%20Cloud%20MTA%20npm%20Packages&amp;severity=medium&amp;id=69f30676cbff5d86109ec9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-campaign-targets-sap-npm-packages-wit-bdc0c295</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Campaign%20Targets%20SAP%20npm%20Packages%20with%20Credential-Stealing%20Malware&amp;severity=medium&amp;id=69f309facbff5d8610a197b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/komari-red-the-monitoring-tool-with-a-built-in-rev-74320819</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Komari%20Red%3A%20The%20Monitoring%20Tool%20with%20a%20Built-in%20Reverse%20Shell&amp;severity=medium&amp;id=69f30676cbff5d86109ec9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/danger-of-libredtail-x5bguest-diaryx5d-wed-apr-29t-3b9ec76e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Danger%20of%20Libredtail%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Apr%2029th)&amp;severity=medium&amp;id=69f2a0a3cbff5d86105fc814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7446-os-command-injection-in-vetcoders-mc-59805fc6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7446%3A%20OS%20Command%20Injection%20in%20VetCoders%20mcp-server-semgrep&amp;severity=medium&amp;id=69f29cfecbff5d86105a1f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/busybox-1370-path-traversal-70e2fd4a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BusyBox%201.37.0%20-%20Path%20Traversal&amp;severity=medium&amp;id=69f5140dcbff5d86105a4033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hustoj-zip-slip-v260124-rce-ef0d2c37</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HUSTOJ%20Zip-Slip%20v26.01.24%20-%20%20RCE&amp;severity=critical&amp;id=69f5140dcbff5d86105a402e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/repetier-server-1410-path-traversal-c4448611</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Repetier-Server%201.4.10%20-%20Path%20Traversal&amp;severity=medium&amp;id=69f5140dcbff5d86105a4029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-11-23h2-denial-of-service-dos-b95fbbf4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2011%2023H2%20-%20Denial%20of%20Service%20(DoS)&amp;severity=medium&amp;id=69f5140dcbff5d86105a4024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-chrome-1450763275-cssfontfeaturevaluesmap-8f3300cd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Chrome%20%20145.0.7632.75%20-%20CSSFontFeatureValuesMap&amp;severity=medium&amp;id=69f5140dcbff5d86105a401f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/python-multipart-0022-path-traversal-8373c47f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Python-Multipart%200.0.22%20-%20Path%20Traversal&amp;severity=medium&amp;id=69f5140dcbff5d86105a401a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fuxa-128-authentication-bypass-rce-exploit-52099322</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FUXA%201.2.8%20-%20Authentication%20Bypass%20%2B%20RCE%20Exploit&amp;severity=critical&amp;id=69f5140ccbff5d86105a4015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-05-01-8427ae88</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-05-01&amp;severity=medium&amp;id=69f48926cbff5d8610b69ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-30-64f96899</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-30&amp;severity=medium&amp;id=69f3ee76cbff5d8610bdb136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56568-na-45131009</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56568%3A%20n%2Fa&amp;severity=high&amp;id=69f3b63fcbff5d86107c4f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46115-na-48e8db7d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46115%3A%20n%2Fa&amp;severity=high&amp;id=69f3b63fcbff5d86107c4f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36759-na-0ad09c8f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36759%3A%20n%2Fa&amp;severity=medium&amp;id=69f39dc3cbff5d8610619066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36758-na-774e68fd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36758%3A%20n%2Fa&amp;severity=medium&amp;id=69f39dc3cbff5d8610619062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36756-na-d656458f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36756%3A%20n%2Fa&amp;severity=medium&amp;id=69f39dc3cbff5d861061905e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36766-na-da6a27cf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36766%3A%20n%2Fa&amp;severity=medium&amp;id=69f39dc3cbff5d861061905a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36340-na-92a3b643</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36340%3A%20n%2Fa&amp;severity=high&amp;id=69f3969dcbff5d8610590866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36765-na-43fdc5e5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36765%3A%20n%2Fa&amp;severity=high&amp;id=69f3969dcbff5d8610590858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36763-na-b3ca5de8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36763%3A%20n%2Fa&amp;severity=medium&amp;id=69f3969dcbff5d8610590853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36762-na-d5217e85</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36762%3A%20n%2Fa&amp;severity=high&amp;id=69f3969dcbff5d861059084e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36761-na-fd1719e4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36761%3A%20n%2Fa&amp;severity=medium&amp;id=69f3969dcbff5d861059084a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36767-na-70f7890d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36767%3A%20n%2Fa&amp;severity=critical&amp;id=69f38fe1cbff5d8610519815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36764-na-de173dd5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36764%3A%20n%2Fa&amp;severity=medium&amp;id=69f38fe1cbff5d8610519811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36760-na-d638c635</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36760%3A%20n%2Fa&amp;severity=critical&amp;id=69f38fe1cbff5d861051980d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36757-na-24ff7efe</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36757%3A%20n%2Fa&amp;severity=medium&amp;id=69f3888dcbff5d8610488546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38940-na-f2a9b73a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38940%3A%20n%2Fa&amp;severity=medium&amp;id=69f376fbcbff5d86103580d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38939-na-8760e67a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38939%3A%20n%2Fa&amp;severity=medium&amp;id=69f376fbcbff5d86103580d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36960-na-fb61bd73</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36960%3A%20n%2Fa&amp;severity=high&amp;id=69f376fbcbff5d86103580cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36959-na-27f123ff</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36959%3A%20n%2Fa&amp;severity=high&amp;id=69f37003cbff5d86102de4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36958-na-705c006b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36958%3A%20n%2Fa&amp;severity=high&amp;id=69f37003cbff5d86102de4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36957-na-9cb1af43</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36957%3A%20n%2Fa&amp;severity=high&amp;id=69f37003cbff5d86102de4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36956-na-ecd02f62</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36956%3A%20n%2Fa&amp;severity=high&amp;id=69f37003cbff5d86102de4e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jung-smart-visu-server-111050-dos-f2510f30</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JUNG%20Smart%20Visu%20Server%201.1.1050%20-%20Dos&amp;severity=medium&amp;id=69f31228cbff5d8610aa6d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-11-25h2-heap-overflow-08190353</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2011%2025H2%20%20-%20Heap%20Overflow&amp;severity=medium&amp;id=69f31228cbff5d8610aa6d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/suse-manager-4315-code-execution-e7e04f83</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SUSE%20Manager%204.3.15%20-%20Code%20Execution&amp;severity=medium&amp;id=69f311cccbff5d8610aa56f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deephas-107-prototype-pollution-ed5d7e4c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=deephas%201.0.7%20-%20Prototype%20Pollution&amp;severity=medium&amp;id=69f311cccbff5d8610aa56f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/erugo-0214-remote-code-execution-rce-548963d0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Erugo%20%200.2.14%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=69f311cccbff5d8610aa56eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-ai-cai-framework-0510-command-inject-09ef43ca</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20AI%20(CAI)%20Framework%200.5.10%20-%20Command%20Injection&amp;severity=medium&amp;id=69f311cccbff5d8610aa56e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/camaleon-cms-v290-path-traversal-cd8974d8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Camaleon%20CMS%20%20v2.9.0%20-%20Path%20Traversal&amp;severity=medium&amp;id=69f311cccbff5d8610aa56e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/js2py-074-rce-eb88e58a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Js2Py%200.74%20-%20%20RCE&amp;severity=critical&amp;id=69f311cccbff5d8610aa56dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frigate-nvr-0163-remote-code-execution-3b38b94c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frigate%20NVR%200.16.3%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69f311cccbff5d8610aa56d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nicegui-361-path-traversal-714d0f57</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NiceGUI%203.6.1%20-%20Path%20Traversal&amp;severity=medium&amp;id=69f311cccbff5d8610aa56d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sumatrapdf-352-remote-code-execution-f01dfc90</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SumatraPDF%203.5.2%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69f311cccbff5d8610aa56cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-30-ddb221ec</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-30&amp;severity=low&amp;id=69f2dc3ecbff5d86108edce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7445-path-traversal-in-zachhandley-zmcpto-f957be68</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7445%3A%20Path%20Traversal%20in%20ZachHandley%20ZMCPTools&amp;severity=medium&amp;id=69f29cfecbff5d86105a1f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7443-os-command-injection-in-burtthecoder-aa04b4f7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7443%3A%20OS%20Command%20Injection%20in%20BurtTheCoder%20mcp-dnstwist&amp;severity=medium&amp;id=69f28eeecbff5d861053269a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7420-buffer-overflow-in-utt-hiper-1250gw-169eee63</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7420%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69f287e7cbff5d8610509dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7419-buffer-overflow-in-utt-hiper-1250gw-a0814406</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7419%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69f287e7cbff5d8610509db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7381-cwe-200-exposure-of-sensitive-inform-0a9be82b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7381%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MIYAGAWA%20Plack%3A%3AMiddleware%3A%3AXSendfile&amp;severity=critical&amp;id=69f287e7cbff5d8610509db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7418-buffer-overflow-in-utt-hiper-1250gw-d147e37f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7418%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69f2849ccbff5d86104f5339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7417-server-side-request-forgery-in-algov-ba913bc8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7417%3A%20Server-Side%20Request%20Forgery%20in%20Algovate%20xhs-mcp&amp;severity=medium&amp;id=69f2849ccbff5d86104f5331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7416-os-command-injection-in-polarvista-x-16228383</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7416%3A%20OS%20Command%20Injection%20in%20PolarVista%20xcode-mcp-server&amp;severity=medium&amp;id=69f27d5bcbff5d86104ce856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7410-sql-injection-in-sourcecodester-pizz-53ed71b0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7410%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f27679cbff5d86104aea45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7409-sql-injection-in-sourcecodester-pizz-57782148</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7409%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f27679cbff5d86104aea3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7408-sql-injection-in-sourcecodester-pizz-120d70b1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7408%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f272cecbff5d86104a3aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7407-sql-injection-in-sourcecodester-pizz-7944d1af</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7407%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f272cecbff5d86104a3aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1858-cwe-20-improper-input-validation-in--9814b0ee</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1858%3A%20CWE-20%20Improper%20input%20validation%20in%20gnu%20wget2&amp;severity=medium&amp;id=69f26bc7cbff5d861048aa2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7404-relative-path-traversal-in-getsimple-23e246fe</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7404%3A%20Relative%20Path%20Traversal%20in%20getsimpletool%20mcpo-simple-server&amp;severity=medium&amp;id=69f26bc7cbff5d861048aa35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7403-path-traversal-in-geldata-gel-mcp-45ac9ba3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7403%3A%20Path%20Traversal%20in%20geldata%20gel-mcp&amp;severity=medium&amp;id=69f26bc7cbff5d861048aa2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34965-cwe-94-improper-control-of-generati-ef87ff52</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34965%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cockpit%20Cockpit%20CMS&amp;severity=high&amp;id=69f264c0cbff5d861045c09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ddos-for-hire-operation-exposed-how-an-operators-d-c6e163a4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DDoS-for-Hire%20Operation%20Exposed%3A%20How%20an%20Operator&apos;s%20Debug%20Build%20Unraveled%20a%20Commercial%20Game-Server%20Botnet&amp;severity=medium&amp;id=69f309facbff5d8610a1979e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kuse-web-app-abused-to-host-phishing-document-514cb57b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kuse%20Web%20App%20Abused%20to%20Host%20Phishing%20Document&amp;severity=medium&amp;id=69f309facbff5d8610a197b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7401-cross-site-scripting-in-sourcecodest-f9b3eff8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7401%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20CET%20Automated%20Grading%20System%20with%20AI%20Predictive%20Analytics&amp;severity=medium&amp;id=69f25db7cbff5d8610434828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7400-path-traversal-in-geekgod382-filesys-b90c500a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7400%3A%20Path%20Traversal%20in%20geekgod382%20filesystem-mcp-server&amp;severity=medium&amp;id=69f25db7cbff5d861043481f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7426-cwe-787-out-of-bounds-write-in-aws-f-24eab3ad</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7426%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=high&amp;id=69f25db7cbff5d8610434834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7425-cwe-125-out-of-bounds-read-in-aws-fr-aefacb3e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7425%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=69f25db7cbff5d861043482f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7424-cwe-191-integer-underflow-wrap-or-wr-d91dfd5c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7424%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=high&amp;id=69f256b0cbff5d86103eb491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7466-cwe-94-improper-control-of-generatio-1d5ea745</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7466%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20berabuddies%20AgentFlow&amp;severity=high&amp;id=69f256b0cbff5d86103eb496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7423-cwe-191-integer-underflow-wrap-or-wr-bcc174c0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7423%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=69f256b0cbff5d86103eb48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7422-cwe-290-authentication-bypass-by-spo-91934019</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7422%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=69f256b0cbff5d86103eb484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7398-path-traversal-in-florensiawidjaja-b-d0a56e96</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7398%3A%20Path%20Traversal%20in%20florensiawidjaja%20BioinfoMCP&amp;severity=medium&amp;id=69f256b0cbff5d86103eb47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27105-cwe-59-improper-link-resolution-bef-35e09182</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27105%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Dell%2FAlienware%20Purchased%20Apps&amp;severity=medium&amp;id=69f256b0cbff5d86103eb47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7439-cwe-346-origin-validation-error-in-b-16452b45</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7439%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20berabuddies%20AgentFlow&amp;severity=medium&amp;id=69f24c6ecbff5d86103a5326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7397-symlink-following-in-nousresearch-he-7f94a293</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7397%3A%20Symlink%20Following%20in%20NousResearch%20hermes-agent&amp;severity=medium&amp;id=69f24c6ecbff5d86103a531c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26015-cwe-77-improper-neutralization-of-s-ba83675d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26015%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20arc53%20DocsGPT&amp;severity=critical&amp;id=69f2451bcbff5d861036cbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7396-path-traversal-in-nousresearch-herme-04c10dff</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7396%3A%20Path%20Traversal%20in%20NousResearch%20hermes-agent&amp;severity=medium&amp;id=69f2451bcbff5d861036cbcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5712-cwe-863-incorrect-authorization-in-s-bb451392</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5712%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SailPoint%20Technologies%20IdentityIQ&amp;severity=high&amp;id=69f2451bcbff5d861036cbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7394-sql-injection-in-sourcecodester-pizz-16a1b2e1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7394%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f2451bcbff5d861036cbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7393-unrestricted-upload-in-sourcecodeste-c982553d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7393%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f23e5ccbff5d8610337c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6915-cwe-1284-improper-validation-of-spec-2dda5bdb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6915%3A%20CWE-1284%20Improper%20validation%20of%20specified%20quantity%20in%20input%20in%20MongoDB%20MongoDB%20Server&amp;severity=medium&amp;id=69f23e5ccbff5d8610337c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6914-cwe-191-integer-underflow-wrap-or-wr-5f06d954</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6914%3A%20CWE-191%20Integer%20underflow%20(wrap%20or%20wraparound)%20in%20MongoDB%20MongoDB%20Server&amp;severity=high&amp;id=69f23e5ccbff5d8610337c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7392-sql-injection-in-sourcecodester-phar-7dcbab12</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7392%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f23e5ccbff5d8610337c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0206-cwe-121-stack-based-buffer-overflow--c7248604</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0206%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=69f2370ccbff5d861030647b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0205-cwe-35-path-traversal-in-sonicwall-s-e2ccd6ba</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0205%3A%20CWE-35%20Path%20traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=69f2370ccbff5d8610306478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0204-cwe-1390-weak-authentication-in-soni-7bfc135a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0204%3A%20CWE-1390%20Weak%20Authentication%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=69f2370ccbff5d8610306475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7391-sql-injection-in-sourcecodester-phar-3738ac00</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7391%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f2370ccbff5d861030647e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7390-cross-site-scripting-in-sourcecodest-973fd07d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7390%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f22c83cbff5d86102980eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40230-cwe-79-improper-neutralization-of-i-a6b68737</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40230%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20helpyio%20helpy&amp;severity=medium&amp;id=69f22c80cbff5d8610297c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40229-cwe-79-improper-neutralization-of-i-81f4303d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40229%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20helpyio%20helpy&amp;severity=medium&amp;id=69f22c80cbff5d8610297c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7389-sql-injection-in-eyoucms-b6a4dbdd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7389%3A%20SQL%20Injection%20in%20EyouCMS&amp;severity=medium&amp;id=69f22c80cbff5d8610297c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vehicle-based-surveillance-tools-kaspersky-officia-694e5419</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vehicle-based%20surveillance%20tools%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69f225d7cbff5d8610264d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2810-cwe-125-out-of-bounds-read-in-netsko-9336b47b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2810%3A%20CWE-125%20Out-of-bounds%20read%20in%20Netskope%20Client&amp;severity=medium&amp;id=69f22c80cbff5d8610297c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7388-code-injection-in-eyoucms-5c52cb60</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7388%3A%20Code%20Injection%20in%20EyouCMS&amp;severity=medium&amp;id=69f256b0cbff5d86103eb49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41940-cwe-306-missing-authentication-for--3aceec8f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41940%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WebPros%20cPanel&amp;severity=critical&amp;id=69f22c83cbff5d86102980f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7386-path-traversal-in-fatbobman-mail-mcp-b63b8672</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7386%3A%20Path%20Traversal%20in%20fatbobman%20mail-mcp-bridge&amp;severity=medium&amp;id=69f22c83cbff5d8610298105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6849-cwe-78-improper-neutralization-of-sp-7671f8b8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6849%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20OS%20My%20Computer&amp;severity=high&amp;id=69f22c83cbff5d8610298102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5166-cwe-22-improper-limitation-of-a-path-67023af4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5166%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20Software%20Center&amp;severity=critical&amp;id=69f22c83cbff5d86102980ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7384-path-traversal-in-ezequiroga-mcp-bas-5157d4ba</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7384%3A%20Path%20Traversal%20in%20ezequiroga%20mcp-bases&amp;severity=medium&amp;id=69f2b622cbff5d86107b2344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5161-cwe-59-improper-link-resolution-befo-30685fe7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5161%3A%20CWE-59%20Improper%20link%20resolution%20before%20file%20access%20(&apos;link%20following&apos;)%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20About&amp;severity=high&amp;id=69f2b622cbff5d86107b2341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7111-cwe-825-expired-pointer-dereference--eb7d12bb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7111%3A%20CWE-825%20Expired%20Pointer%20Dereference%20in%20HMBRAND%20Text%3A%3ACSV_XS&amp;severity=high&amp;id=69f2370ccbff5d8610306485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5141-cwe-269-improper-privilege-managemen-a6851a94</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5141%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20Software%20Center&amp;severity=high&amp;id=69f22c83cbff5d86102980fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41220-cwe-787-in-acronis-acronis-devicelo-da8bb959</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41220%3A%20CWE-787%20in%20Acronis%20Acronis%20DeviceLock%20DLP&amp;severity=high&amp;id=69f22c83cbff5d86102980f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41952-cwe-123-in-acronis-acronis-devicelo-5470b5be</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41952%3A%20CWE-123%20in%20Acronis%20Acronis%20DeviceLock%20DLP&amp;severity=high&amp;id=69f2b622cbff5d86107b233e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25852-cwe-427-in-acronis-acronis-devicelo-9477b775</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25852%3A%20CWE-427%20in%20Acronis%20Acronis%20DeviceLock%20DLP&amp;severity=medium&amp;id=69f2b622cbff5d86107b2338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42525-vulnerability-in-jenkins-project-je-9ecf4150</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42525%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Microsoft%20Entra%20ID%20(previously%20Azure%20AD)%20Plugin&amp;severity=medium&amp;id=69f20cdfcbff5d8610181a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42524-vulnerability-in-jenkins-project-je-e951ec4c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42524%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20HTML%20Publisher%20Plugin&amp;severity=high&amp;id=69f20cdfcbff5d8610181a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42523-vulnerability-in-jenkins-project-je-d7de8e87</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42523%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20GitHub%20Plugin&amp;severity=critical&amp;id=69f20cdfcbff5d8610181a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42522-vulnerability-in-jenkins-project-je-fe6b5e9b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42522%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20GitHub%20Branch%20Source%20Plugin&amp;severity=medium&amp;id=69f20cdfcbff5d8610181a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42521-vulnerability-in-jenkins-project-je-64f5617c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42521%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Matrix%20Authorization%20Strategy%20Plugin&amp;severity=medium&amp;id=69f20cdfcbff5d8610181a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42520-vulnerability-in-jenkins-project-je-f58d910a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42520%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Credentials%20Binding%20Plugin&amp;severity=high&amp;id=69f20cdfcbff5d8610181a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42519-vulnerability-in-jenkins-project-je-5da9507b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42519%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Script%20Security%20Plugin&amp;severity=medium&amp;id=69f20cdfcbff5d8610181a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/todays-odd-web-requests-wed-apr-29th-2b0ae874</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Today&apos;s%20Odd%20Web%20Requests%2C%20(Wed%2C%20Apr%2029th)&amp;severity=medium&amp;id=69f2061ccbff5d861012618b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fresh-litellm-vulnerability-exploited-shortly-afte-9234eff7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fresh%20LiteLLM%20Vulnerability%20Exploited%20Shortly%20After%20Disclosure&amp;severity=low&amp;id=69f2024dcbff5d8610101209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5140-cwe-93-improper-neutralization-of-cr-5a5c2ac6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5140%3A%20CWE-93%20Improper%20neutralization%20of%20CRLF%20sequences%20(&apos;CRLF%20injection&apos;)%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20Update&amp;severity=high&amp;id=69f20cdfcbff5d8610181a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phoenix-rising-exposing-the-phaas-kit-behind-globa-ec601d06</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phoenix%20Rising%3A%20Exposing%20the%20PhaaS%20Kit%20Behind%20Global%20Mass%20Phishing%20Campaigns&amp;severity=medium&amp;id=69f876a6cbff5d861004bd29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lofystealer-malware-targeting-minecraft-players-9a2321f9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LofyStealer%3A%20Malware%20targeting%20Minecraft%20players.&amp;severity=medium&amp;id=69f30d7fcbff5d8610a2e829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-attack-activities-using-sshtor-tunnels-b1fcf896</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20Attack%20Activities%20Using%20SSH%2BTOR%20Tunnels%20to%20Achieve%20Covert%20Persistence&amp;severity=medium&amp;id=69f30d7fcbff5d8610a2e832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-internet-facing-vnc-servers-expose-ics-a294c997</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20Internet-Facing%20VNC%20Servers%20Expose%20ICS%2FOT&amp;severity=medium&amp;id=69f1f43dcbff5d861005f286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22745-cwe-400-uncontrolled-resource-consu-a0301f50</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22745%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=69f1f44acbff5d861005f7f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22741-cwe-524-information-exposure-throug-9a0a3e0c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22741%3A%20CWE-524%20Information%20Exposure%20Through%20Caching%20in%20VMware%20Spring%20Framework&amp;severity=low&amp;id=69f2b622cbff5d86107b2353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2902-cwe-79-improper-neutralization-of-in-3005363c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aguidrevitch%20WP%20Meteor%20Website%20Speed%20Optimization%20Addon&amp;severity=medium&amp;id=69f1f44acbff5d861005f7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/checkmarx-confirms-data-stolen-in-supply-chain-att-ea4d4783</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Checkmarx%20Confirms%20Data%20Stolen%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69f1e62ecbff5d8610fb0e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multi-stage-malware-execution-chain-analysis-b060a93b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multi-Stage%20Malware%20Execution%20Chain%20Analysis&amp;severity=medium&amp;id=69f1e2aacbff5d8610f7a275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22740-cwe-400-uncontrolled-resource-consu-f8a20f92</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22740%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=69f2b622cbff5d86107b234f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42641-server-side-request-forgery-ssrf-in-94403813</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42641%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ILLID%20Share%20This%20Image&amp;severity=medium&amp;id=69f1f131cbff5d861004acf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42645-cross-site-request-forgery-csrf-in--8b533942</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42645%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=medium&amp;id=69f1f131cbff5d861004acfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42648-missing-authorization-in-brainstorm-9ac4bf94</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42648%3A%20Missing%20Authorization%20in%20Brainstorm%20Force%20Spectra&amp;severity=medium&amp;id=69f1f131cbff5d861004ad03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42642-missing-authorization-in-stellarwp--26ce44db</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42642%3A%20Missing%20Authorization%20in%20StellarWP%20GiveWP&amp;severity=medium&amp;id=69f1f131cbff5d861004acf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42646-improper-neutralization-of-special--630cfd15</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42646%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Steve%20Burge%20TaxoPress&amp;severity=high&amp;id=69f1f131cbff5d861004ad00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42643-improper-neutralization-of-input-du-759f1676</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42643%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StellarWP%20Image%20Widget&amp;severity=medium&amp;id=69f1f131cbff5d861004acf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42644-exposure-of-sensitive-system-inform-aea32505</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42644%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPDeveloper%20BetterDocs&amp;severity=medium&amp;id=69f1f131cbff5d861004acfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42652-improper-neutralization-of-input-du-a84dea82</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42652%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration&amp;severity=high&amp;id=69f1f131cbff5d861004ad06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-cyber-group-handala-targets-us-troops-in-b-09ec8a91</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Cyber%20Group%20Handala%20Targets%20US%20Troops%20in%20Bahrain&amp;severity=medium&amp;id=69f1df25cbff5d8610f5814e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/user-interaction-with-a-clickfix-style-phishing-si-8aeab9dd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=User%20interaction%20with%20a%20ClickFix-style%20phishing%20site%20resulted%20in%20execution%20of%20an%20obfuscated%20PowerShell%20command&amp;severity=medium&amp;id=69f1e2aacbff5d8610f7a27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/38-vulnerabilities-found-in-openemr-medical-softwa-1f54d80c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=38%20Vulnerabilities%20Found%20in%20OpenEMR%20Medical%20Software&amp;severity=medium&amp;id=69f1d81ecbff5d8610efe771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kycshadow-an-android-banking-malware-exploiting-fa-6f5f80b1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KYCShadow%3A%20An%20Android%20Banking%20Malware%20Exploiting%20Fake%20KYC%20Workflows%20for%20Credential%20and%20OTP%20Theft&amp;severity=medium&amp;id=69f1dbedcbff5d8610f30c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rebex-based-telegram-rat-targeting-vietnam-8a039205</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rebex-based%20Telegram%20RAT%20Targeting%20Vietnam&amp;severity=medium&amp;id=69f1dbedcbff5d8610f30bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kyber-ransomware-is-not-just-post-quantum-name-dro-b58c6bef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kyber%20ransomware%20is%20not%20just%20post-quantum%20name-dropping&amp;severity=medium&amp;id=69f1dbedcbff5d8610f30be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-147-firefox-150-security-updates-rolling-ou-587da3ca</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20147%2C%20Firefox%20150%20Security%20Updates%20Rolling%20Out&amp;severity=critical&amp;id=69f1d115cbff5d8610e83d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42518-cwe-321-use-of-hard-coded-cryptogra-50b8271b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42518%3A%20CWE-321%20Use%20of%20hard-coded%20cryptographic%20key%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1cdd8cbff5d8610e56f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3325-cwe-89-improper-neutralization-of-sp-5f601496</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3325%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20CRM%20Sistemas%20de%20Fidelizaci%C3%B3n%20MegaCMS&amp;severity=critical&amp;id=69f1cdd8cbff5d8610e56f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42517-cwe-639-authorization-bypass-throug-9fd1254f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42517%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1cdd8cbff5d8610e56f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4019-cwe-862-missing-authorization-in-com-0380965b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4019%3A%20CWE-862%20Missing%20Authorization%20in%20complianz%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=medium&amp;id=69f1cdd8cbff5d8610e56f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42516-cwe-639-authorization-bypass-throug-09c867b0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42516%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1cdd8cbff5d8610e56f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42515-cwe-639-authorization-bypass-throug-ffcae9ae</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42515%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1c306cbff5d8610dc362f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42514-cwe-319-cleartext-transmission-of-s-ef582b56</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42514%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1c306cbff5d8610dc362c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42513-cwe-287-improper-authentication-in--4bb104e9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42513%3A%20CWE%20287%20Improper%20Authentication%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1c306cbff5d8610dc3629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10503-cwe-79-improper-neutralization-of-i-f39da64f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10503%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=69f1c306cbff5d8610dc3623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42412-cwe-862-missing-authorization-in-we-db7d51b5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42412%3A%20CWE-862%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=medium&amp;id=69f1c306cbff5d8610dc3626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42377-cwe-862-missing-authorization-in-br-bc5666a6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42377%3A%20CWE-862%20Missing%20Authorization%20in%20Brainstorm%20Force%20SureForms%20Pro&amp;severity=high&amp;id=69f1b4f6cbff5d8610c35118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-github-vulnerability-exposed-millions-of--29b3abff</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20GitHub%20Vulnerability%20Exposed%20Millions%20of%20Repositories&amp;severity=critical&amp;id=69f1a6e5cbff5d8610b0fda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21023-cwe-345-insufficient-verification-o-0ad16dbf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21023%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69f1f131cbff5d861004ad09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35155-cwe-522-insufficiently-protected-cr-bbbf1a46</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35155%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Dell%20iDRAC10&amp;severity=high&amp;id=69f1f133cbff5d861004adaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23773-cwe-918-server-side-request-forgery-08701a02</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23773%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Dell%20Disk%20Library%20for%20mainframe%20DLm8700&amp;severity=medium&amp;id=69f1803bcbff5d86106f825a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42615-cwe-79-improper-neutralization-of-i-760a9adb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GCHQ%20CyberChef&amp;severity=high&amp;id=69f1803bcbff5d86106f825d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gachiloader-adopts-ai-skill-lure-ffed89b4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GachiLoader%20adopts%20AI%20skill%20lure&amp;severity=medium&amp;id=69f1aa6acbff5d8610b46006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-29th-2026-httpsi-00ba5c0e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%2029th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9910%2C%20(Wed%2C%20Apr%2029th)&amp;severity=medium&amp;id=69f1679fcbff5d86104c9397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-30-e20ac66a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-30&amp;severity=medium&amp;id=69f368dfcbff5d8610ed77ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38992-na-f6952d1b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38992%3A%20n%2Fa&amp;severity=critical&amp;id=69f2b622cbff5d86107b234b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36837-na-cd9ff5e7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36837%3A%20n%2Fa&amp;severity=high&amp;id=69f2b622cbff5d86107b233b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-29-b736825e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-29&amp;severity=medium&amp;id=69f29cf6cbff5d86105a0943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38993-na-2d47aa11</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38993%3A%20n%2Fa&amp;severity=medium&amp;id=69f26bc7cbff5d861048aa43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38991-na-9df2d0b6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38991%3A%20n%2Fa&amp;severity=high&amp;id=69f26bc7cbff5d861048aa3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36841-na-3e658d19</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36841%3A%20n%2Fa&amp;severity=critical&amp;id=69f26bc7cbff5d861048aa3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50328-na-150ceb4b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50328%3A%20n%2Fa&amp;severity=high&amp;id=69f26bc7cbff5d861048aa27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37555-na-79951ab9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37555%3A%20n%2Fa&amp;severity=high&amp;id=69f22c80cbff5d8610297c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30769-na-06ff0502</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30769%3A%20n%2Fa&amp;severity=high&amp;id=69f22c80cbff5d8610297c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56537-na-85afad68</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56537%3A%20n%2Fa&amp;severity=medium&amp;id=69f22c80cbff5d8610297c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56536-na-e9d95af7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56536%3A%20n%2Fa&amp;severity=medium&amp;id=69f22c80cbff5d8610297c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56535-na-3606a7f6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56535%3A%20n%2Fa&amp;severity=medium&amp;id=69f22c80cbff5d8610297c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56534-na-7d725f61</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56534%3A%20n%2Fa&amp;severity=medium&amp;id=69f22c80cbff5d8610297c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atlona-atomerx21-authenticated-command-injection-57e18a85</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atlona%20ATOMERX21%20-%20Authenticated%20Command%20Injection&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/langchain-core-124-sstirce-851a4282</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LangChain%20Core%201.2.4%20-%20SSTI%2FRCE&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fedora-local-privilege-escalation-13ae1a26</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fedora%20-%20Local%20Privilege%20Escalation&amp;severity=high&amp;id=69f1f0fdcbff5d8610047e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xibo-cms-430-rce-via-ssti-7c5e3cc6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Xibo%20CMS%20%204.3.0%20-%20RCE%20via%20SSTI&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/facturascripts-202543-xss-d0891411</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FacturaScripts%202025.43%20-%20XSS&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juzaweb-cms-342-authenticated-remote-code-executio-c84bb825</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JuzaWeb%20CMS%203.4.2%20-%20Authenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gunet-openeclass-e-learning-platform-42-remote-cod-4148bd11</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GUnet%20OpenEclass%20E-learning%20platform%20%3C%204.2%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openkm-6312-multiple-2544ee36</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenKM%206.3.12%20-%20Multiple&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openwrt-2305-authenticated-remote-code-execution-r-acd4aa25</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenWrt%2023.05%20-%20Authenticated%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geographiclib-v251-stack-buffer-overflow-b77f235e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GeographicLib%20v2.5.1%20-%20stack%20buffer%20overflow&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-4016-improper-authorization-00acffb2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFAQ%20%204.0.16%20-%20Improper%20Authorization&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gnu-inetutils-26-telnetd-remote-privilege-escalati-59fbb95e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GNU%20InetUtils%202.6%20-%20Telnetd%20Remote%20Privilege%20Escalation&amp;severity=high&amp;id=69f1f0fdcbff5d8610047e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/craft-cms-5616-rce-18355586</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Craft%20CMS%205.6.16%20-%20RCE&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hax-cms-24x-stored-cross-site-scripting-xss-9cfb4f44</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HAX%20CMS%2024.x%20-%20Stored%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-29-bbf6d718</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-29&amp;severity=low&amp;id=69f1bbf6cbff5d8610cdaf93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40560-cwe-444-inconsistent-interpretation-a3001da8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40560%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20MIYAGAWA%20Starman&amp;severity=high&amp;id=69f14b7fcbff5d8610f33f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7355-use-after-free-in-google-chrome-b15f15fb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7355%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7340-integer-overflow-in-google-chrome-dbfe7534</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7340%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69f13d70cbff5d8610e35442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7339-heap-buffer-overflow-in-google-chrom-460e63fe</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7339%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3543e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7341-use-after-free-in-google-chrome-24412985</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7341%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e35446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7342-use-after-free-in-google-chrome-80fd3be9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7342%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3544a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7338-use-after-free-in-google-chrome-7ba0e538</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7338%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3543a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7345-insufficient-validation-of-untrusted-0072543f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7345%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e3554a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7346-inappropriate-implementation-in-goog-a40d1ce6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7346%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e3554e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7347-use-after-free-in-google-chrome-85b93522</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7347%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7337-type-confusion-in-google-chrome-10aceb50</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7337%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e35436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7336-use-after-free-in-google-chrome-6c0c93bf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7336%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e35432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7335-use-after-free-in-google-chrome-cc0ed834</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7335%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3542e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7348-use-after-free-in-google-chrome-43c8d283</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7348%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7349-use-after-free-in-google-chrome-98167a07</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7349%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e3555a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7350-use-after-free-in-google-chrome-4aeffe71</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7350%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e3555e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7351-race-in-google-chrome-4db75acb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7351%3A%20Race%20in%20Google%20Chrome&amp;severity=low&amp;id=69f13d73cbff5d8610e35562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7352-use-after-free-in-google-chrome-f7637a8e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7352%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7353-heap-buffer-overflow-in-google-chrom-d89a62e8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7353%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7354-out-of-bounds-read-and-write-in-goog-4de54db5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7354%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7356-use-after-free-in-google-chrome-f2efabb3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7356%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7357-use-after-free-in-google-chrome-02ed97d0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7357%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7334-use-after-free-in-google-chrome-11241864</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7334%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3542a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7358-use-after-free-in-google-chrome-7da645fe</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7358%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7359-use-after-free-in-google-chrome-2c93f484</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7359%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7360-insufficient-validation-of-untrusted-22afc524</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7360%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=low&amp;id=69f13d76cbff5d8610e355e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7333-use-after-free-in-google-chrome-9c8ad517</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7333%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69f13d70cbff5d8610e35426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7343-use-after-free-in-google-chrome-6725c92f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7343%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7344-use-after-free-in-google-chrome-1aabf4b9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7344%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7361-use-after-free-in-google-chrome-76db2a62</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7361%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7363-use-after-free-in-google-chrome-7aed2952</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7363%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33467-cwe-347-improper-verification-of-cr-ea402a3a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33467%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Elastic%20Elastic%20Package%20Registry&amp;severity=medium&amp;id=69f1649ccbff5d861047eb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41446-cwe-912-hidden-functionality-in-sna-09f17c72</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41446%3A%20CWE-912%20Hidden%20Functionality%20in%20Snap%20One%2C%20LLC%20WattBox%20800&amp;severity=critical&amp;id=69f1649ccbff5d861047eb94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7319-path-traversal-in-elinsky-execution--079a5a55</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7319%3A%20Path%20Traversal%20in%20elinsky%20execution-system-mcp&amp;severity=medium&amp;id=69f1649ccbff5d861047ed05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-fake-dhl-campaign-built-to-steal-credenti-42ac68f0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20Fake%20DHL%20Campaign%20Built%20to%20Steal%20Credentials&amp;severity=medium&amp;id=69f1adeecbff5d8610b7f22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7318-path-traversal-in-elie-mcp-project-486418e4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7318%3A%20Path%20Traversal%20in%20elie%20mcp-project&amp;severity=medium&amp;id=69f1649ccbff5d861047ecff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7317-deserialization-in-grav-cms-501c1526</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7317%3A%20Deserialization%20in%20Grav%20CMS&amp;severity=low&amp;id=69f1649ccbff5d861047ecf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7316-command-injection-in-eiliyaabedini-a-2693f5b9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7316%3A%20Command%20Injection%20in%20eiliyaabedini%20aider-mcp&amp;severity=medium&amp;id=69f1649ccbff5d861047ecf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7315-path-traversal-in-eiceblue-spire-pdf-edd695ea</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7315%3A%20Path%20Traversal%20in%20eiceblue%20spire-pdf-mcp-server&amp;severity=medium&amp;id=69f1649ccbff5d861047ec0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7314-path-traversal-in-eiceblue-spire-doc-6456bd3d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7314%3A%20Path%20Traversal%20in%20eiceblue%20spire-doc-mcp-server&amp;severity=medium&amp;id=69f1649ccbff5d861047ebfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7306-use-of-hard-coded-cryptographic-key--32964878</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7306%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=69f1649ccbff5d861047ebed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7305-server-side-request-forgery-in-xuxue-de572ab7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7305%3A%20Server-Side%20Request%20Forgery%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=69f1649ccbff5d861047ebdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7303-improper-control-of-resource-identif-a34be21a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7303%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=69f1649ccbff5d861047ebcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7297-cross-site-scripting-in-sourcecodest-bf6ed27e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7297%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649ccbff5d861047ebb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insurance-data-gives-cisos-new-ammo-for-budg-687e996c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insurance%20Data%20Gives%20CISOs%20New%20Ammo%20for%20Budget%20Talks&amp;severity=medium&amp;id=69f0fe25cbff5d861062d85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7296-cross-site-scripting-in-sourcecodest-6568942a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7296%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649ccbff5d861047eba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7295-cross-site-scripting-in-sourcecodest-b79ed129</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7295%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649fcbff5d861047ef5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7294-cross-site-scripting-in-sourcecodest-cd5e59fe</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7294%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649fcbff5d861047eedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24231-cwe-918-server-side-request-forgery-64e01ed7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24231%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20NVIDIA%20NemoClaw&amp;severity=medium&amp;id=69f1649fcbff5d861047eec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24222-cwe-497-exposure-of-sensitive-syste-98c62a9d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24222%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20NVIDIA%20NemoClaw&amp;severity=high&amp;id=69f1649fcbff5d861047eebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24204-cwe-20-improper-input-validation-in-213f6e73</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24204%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NVIDIA%20FLARE%20SDK&amp;severity=medium&amp;id=69f1649fcbff5d861047eeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24186-cwe-502-deserialization-of-untruste-a3469bdd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24186%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20FLARE%20SDK&amp;severity=high&amp;id=69f1649fcbff5d861047eeb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7293-sql-injection-in-sourcecodester-pizz-6e24f646</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7293%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649fcbff5d861047eed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24178-cwe-639-authorization-bypass-throug-2c6d438d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24178%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20NVIDIA%20FLARE%20SDK&amp;severity=critical&amp;id=69f1649fcbff5d861047eead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6807-cwe-611-in-nsa-grassmarlin-7885cf50</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6807%3A%20CWE-611%20in%20NSA%20GRASSMARLIN&amp;severity=medium&amp;id=69f1649fcbff5d861047eecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3893-cwe-306-in-carlson-software-vasco-b--bccf8b2a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3893%3A%20CWE-306%20in%20Carlson%20Software%20VASCO-B%20GNSS%20Receiver&amp;severity=critical&amp;id=69f1649fcbff5d861047eec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7292-improper-authorization-in-o2oa-7cdf1fbd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7292%3A%20Improper%20Authorization%20in%20o2oa&amp;severity=medium&amp;id=69f1649fcbff5d861047eecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7291-server-side-request-forgery-in-o2oa-12949d3a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7291%3A%20Server-Side%20Request%20Forgery%20in%20o2oa&amp;severity=medium&amp;id=69f1649ccbff5d861047ed20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vimeo-confirms-user-and-customer-data-breach-867b581e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vimeo%20Confirms%20User%20and%20Customer%20Data%20Breach&amp;severity=medium&amp;id=69f0ec91cbff5d8610507224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5794-cwe-694-use-of-multiple-resources-wi-d387600a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5794%3A%20CWE-694%20Use%20of%20multiple%20resources%20with%20duplicate%20identifier%20in%20Ercom%20Cryptobox&amp;severity=medium&amp;id=69f1649ccbff5d861047ed10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6238-cwe-126-buffer-over-read-in-the-gnu--edbd45ec</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6238%3A%20CWE-126%20Buffer%20over-read%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=69f1649ccbff5d861047ed13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vect-ransomware-by-design-wiper-by-accident-b77be0ac</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VECT%3A%20Ransomware%20by%20design%2C%20Wiper%20by%20accident&amp;severity=medium&amp;id=69f1adeecbff5d8610b7f21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7290-sql-injection-in-jeecgboot-44ffcdae</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7290%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=69f1649ccbff5d861047ed17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-practical-guide-to-secure-vibe-coding-for-small--31147acf</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20practical%20guide%20to%20secure%20vibe-coding%20for%20small%20businesses%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69f1f187cbff5d861004fd5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-mythos-moment-enterprises-must-fight-agents-wi-60e10811</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Mythos%20Moment%3A%20Enterprises%20Must%20Fight%20Agents%20with%20Agents&amp;severity=medium&amp;id=69f0d779cbff5d861035325e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-a-step-by-step-approach-to-ai-govern-1e4bf571</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20A%20Step-by-Step%20Approach%20to%20AI%20Governance&amp;severity=medium&amp;id=69f0d3f6cbff5d86102cee14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41873-cwe-444-inconsistent-interpretation-592a2ec3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41873%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Pony%20Mail&amp;severity=critical&amp;id=69f1649ccbff5d861047ed0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7289-buffer-overflow-in-d-link-dir-825m-c9751f35</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7289%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825M&amp;severity=high&amp;id=69f0d09ecbff5d86102a30e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40969-cwe-209-generation-of-error-message-4c52c0ed</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40969%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Spring%20Spring%20gRPC&amp;severity=low&amp;id=69f0d09ecbff5d86102a30d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/robinhood-vulnerability-exploited-for-phishing-att-c1650404</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Robinhood%20Vulnerability%20Exploited%20for%20Phishing%20Attacks&amp;severity=medium&amp;id=69f0c969cbff5d861023bcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7288-buffer-overflow-in-d-link-dir-825m-790ca980</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7288%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825M&amp;severity=high&amp;id=69f0d09ecbff5d86102a30de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7283-sql-injection-in-sourcecodester-phar-cfb7d591</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7283%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0d09ecbff5d86102a30d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40556-cwe-732-incorrect-permission-assign-c931c0a2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40556&amp;severity=medium&amp;id=69f0c288cbff5d86101cc9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7321-vulnerability-in-mozilla-firefox-1855007f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7321%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69f0c288cbff5d86101cc9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7324-vulnerability-in-mozilla-firefox-f4a866b8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7324%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69f1649ccbff5d861047ed27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7323-vulnerability-in-mozilla-firefox-ec550385</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7323%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69f0c288cbff5d86101cc9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7322-vulnerability-in-mozilla-firefox-beb624de</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7322%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69f0c288cbff5d86101cc9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7320-vulnerability-in-mozilla-firefox-046c3b9e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7320%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69f0c288cbff5d86101cc9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40968-cwe-653-improper-isolation-or-compa-49d1c2fc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40968%3A%20CWE-653%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Spring%20Spring%20gRPC&amp;severity=medium&amp;id=69f0c288cbff5d86101cc9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alleged-chinese-state-hacker-extradited-to-us-579666a9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alleged%20Chinese%20State%20Hacker%20Extradited%20to%20US&amp;severity=medium&amp;id=69f0b7d6cbff5d86101429f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7282-sql-injection-in-sourcecodester-phar-69a59036</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7282%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0c288cbff5d86101cc9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/http-requests-with-x-vercel-set-bypass-cookie-head-da2f8e7a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTTP%20Requests%20with%20X-Vercel-Set-Bypass-Cookie%20Header%2C%20(Tue%2C%20Apr%2028th)&amp;severity=medium&amp;id=69f0b7e2cbff5d8610142b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7281-cross-site-scripting-in-sourcecodest-257c9389</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7281%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0b827cbff5d8610144410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40552-cwe-669-incorrect-resource-transfer-7605e272</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40552%3A%20CWE-669%3A%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20BinSoft%20mpGabinet&amp;severity=medium&amp;id=69f0b827cbff5d86101443fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40551-cwe-603-use-of-client-side-authenti-2147c575</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40551%3A%20CWE-603%3A%20Use%20of%20Client-Side%20Authentication%20in%20BinSoft%20mpGabinet&amp;severity=high&amp;id=69f0b827cbff5d86101443f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40550-cwe-250-execution-with-unnecessary--cd433f12</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40550%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20BinSoft%20mpGabinet&amp;severity=medium&amp;id=69f0b827cbff5d86101443f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6706-cwe-862-missing-authorization-in-dev-844794df</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6706%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69f0b827cbff5d8610144405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5944-cwe-306-missing-authentication-for-c-9c2e28be</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5944%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Nutanix%20Cisco%20Intersight%20Device%20Connector%20for%20Prism%20Central&amp;severity=medium&amp;id=69f0b827cbff5d8610144400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vect-ransomware-by-design-wiper-by-accident-453aa263</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VECT%3A%20Ransomware%20by%20design%2C%20Wiper%20by%20accident&amp;severity=medium&amp;id=69f1f175cbff5d861004d351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7272-path-traversal-in-williamcloudqi-mat-89a68a41</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7272%3A%20Path%20Traversal%20in%20WilliamCloudQi%20matlab-mcp-server&amp;severity=medium&amp;id=69f0b827cbff5d8610144408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dozens-of-open-vsx-extension-clones-linked-to-glas-a7561f2b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dozens%20of%20Open%20VSX%20Extension%20Clones%20Linked%20to%20GlassWorm%20Malware&amp;severity=medium&amp;id=69f0ad4acbff5d86100ca8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7309-untrusted-search-path-in-red-hat-red-1a33e6b6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7309%3A%20Untrusted%20Search%20Path%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Container%20Platform%204&amp;severity=medium&amp;id=69f0b132cbff5d86100ea269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7271-path-traversal-in-dv0x-creative-ad-a-e832cdd5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7271%3A%20Path%20Traversal%20in%20DV0x%20creative-ad-agent&amp;severity=medium&amp;id=69f0b132cbff5d86100ea261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7269-cross-site-scripting-in-sourcecodest-fbd6595d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7269%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0b132cbff5d86100ea259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5435-cwe-787-out-of-bounds-write-in-the-g-f1e870bd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5435%3A%20CWE-787%20Out-of-bounds%20write%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69f0b132cbff5d86100ea24c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/electric-motorcycles-and-scooters-face-hacking-ris-b197840f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Electric%20Motorcycles%20and%20Scooters%20Face%20Hacking%20Risks%20to%20Security%20and%20Rider%20Safety&amp;severity=medium&amp;id=69f0a2bdcbff5d8610071866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5781-cwe-285-improper-authorization-in-mp-d70ee5a7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5781%3A%20CWE-285%20Improper%20Authorization%20in%20MphRx%20Minerva&amp;severity=high&amp;id=69f0b132cbff5d86100ea256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5780-cwe-284-improper-access-control-in-m-d7854785</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5780%3A%20CWE-284%20Improper%20Access%20Control%20in%20MphRx%20Minerva&amp;severity=high&amp;id=69f0b132cbff5d86100ea253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5779-cwe-284-improper-access-control-in-m-135a916d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5779%3A%20CWE-284%20Improper%20Access%20Control%20in%20MphRx%20Minerva&amp;severity=critical&amp;id=69f0b132cbff5d86100ea250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/no-patch-for-new-phantomrpc-privilege-escalation-t-65e5eb4a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=No%20Patch%20for%20New%20PhantomRPC%20Privilege%20Escalation%20Technique%20in%20Windows&amp;severity=high&amp;id=69f09bb5cbff5d861003a307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7268-sql-injection-in-sourcecodester-pizz-852d66f9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7268%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f0b136cbff5d86100ea407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7267-sql-injection-in-sourcecodester-pizz-4fc4bde8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7267%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f0c288cbff5d86101cc9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/germany-suspects-russia-is-behind-signal-phishing--c6c064af</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Germany%20Suspects%20Russia%20Is%20Behind%20Signal%20Phishing%20That%20Targeted%20Top%20Officials&amp;severity=medium&amp;id=69f094adcbff5d8610ff87f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7266-sql-injection-in-sourcecodester-pizz-528fff14</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7266%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f0d09ecbff5d86102a30ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7265-sql-injection-in-sourcecodester-pizz-1ad58425</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7265%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f0912acbff5d8610facead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3323-cwe-306-missing-authentication-for-c-7fc2660c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3323%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20VEGA%20Grieshaber%20VEGAPULS%206X%20Two-wire%20PROFINET%2C%20Modbus%20TCP%2C%20OPC%20UA%20(Ethernet-APL)&amp;severity=high&amp;id=69f0912acbff5d8610facea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7280-cwe-428-unquoted-search-path-or-elem-493f4b61</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7280%3A%20CWE-428%20Unquoted%20search%20path%20or%20element%20in%20eMPIA%20Technology%20AVACAST&amp;severity=high&amp;id=69f086c2cbff5d8610f343d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7279-cwe-427-uncontrolled-search-path-ele-2fa5114d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7279%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20eMPIA%20Technology%20AVACAST&amp;severity=high&amp;id=69f086bfcbff5d8610f3428b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7264-sql-injection-in-sourcecodester-pizz-cadf1164</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7264%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f086bfcbff5d8610f34284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41636-cwe-674-uncontrolled-recursion-in-a-a7343026</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41636%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41607-cwe-125-out-of-bounds-read-in-apach-679c921d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41607%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=medium&amp;id=69f086bfcbff5d8610f3427c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41606-cwe-674-uncontrolled-recursion-in-a-d467d0ce</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41606%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=medium&amp;id=69f086bfcbff5d8610f34278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41605-cwe-190-integer-overflow-or-wraparo-6b02b2fa</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41605%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41604-cwe-125-out-of-bounds-read-in-apach-dc16fb9a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41604%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41603-cwe-297-improper-validation-of-cert-6578089c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41603%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f3426c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41602-cwe-190-integer-overflow-or-wraparo-27433c8b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41602%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48431-cwe-762-mismatched-memory-managemen-cbe6be14</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48431%3A%20CWE-762%20Mismatched%20Memory%20Management%20Routines%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7248-buffer-overflow-in-d-link-di-8100-798ac14e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7248%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=critical&amp;id=69f0788fcbff5d8610e928f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7247-buffer-overflow-in-d-link-di-8100-97660054</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7247%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=69f0788fcbff5d8610e928ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spectrum-security-emerges-from-stealth-mode-with-1-15f15493</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spectrum%20Security%20Emerges%20From%20Stealth%20Mode%20With%20%2419%20Million&amp;severity=medium&amp;id=69f07185cbff5d8610e26cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7244-os-command-injection-in-totolink-a80-f82a0e92</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7244%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f0788fcbff5d8610e928e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ot-focused-malware-highlights-emerging-risk-to-wat-3119c9d5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OT-Focused%20Malware%20Highlights%20Emerging%20Risk%20to%20Water%20Infrastructure%20Systems&amp;severity=medium&amp;id=69f0beddcbff5d8610199dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attack-activity-analysis-using-sshtor-tunnels-for--d90ac7f5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attack%20Activity%20Analysis%20Using%20SSH%2BTOR%20Tunnels%20for%20Covert%20Persistence&amp;severity=medium&amp;id=69f1b4f5cbff5d8610c35091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-third-vultr-seoul-box-60-kimsuky-domains-18-mont-eeb2e008</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Third%20Vultr%20Seoul%20Box%3A%2060%2B%20Kimsuky%20Domains%2C%2018%20Months%20of%20DDNS%20Rotation%2C%20and%20a%205-Year%20Infrastructure%20Trail&amp;severity=medium&amp;id=69f0c280cbff5d86101cb678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7243-os-command-injection-in-totolink-a80-73a189fb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7243%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f0788fcbff5d8610e928df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10539-cwe-295-improper-certificate-valida-f564b146</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10539%3A%20CWE-295%20Improper%20certificate%20validation%20in%20DeskTime%20DeskTime%20Time%20Tracking%20App&amp;severity=medium&amp;id=69f0788fcbff5d8610e928c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7242-os-command-injection-in-totolink-a80-cac9fbc1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7242%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f0788fcbff5d8610e928d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40980-cwe-400-uncontrolled-resource-consu-175c37aa</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40980%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Spring%20Spring%20AI&amp;severity=medium&amp;id=69f0788fcbff5d8610e928ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40979-cwe-377-insecure-temporary-file-in--f6bd7b67</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40979%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Spring%20Spring%20AI&amp;severity=medium&amp;id=69f0788fcbff5d8610e928cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7241-os-command-injection-in-totolink-a80-69ec6c50</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7241%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f0788fcbff5d8610e928d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40978-cwe-89-improper-neutralization-of-s-d943c58c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40978%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69f0788fcbff5d8610e928c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7240-os-command-injection-in-totolink-a80-cd808cb1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7240%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f06034cbff5d8610cfe2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tall-tales-how-chinese-actors-use-impersonation-an-d6edf126</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tall%20Tales%3A%20How%20Chinese%20Actors%20Use%20Impersonation%20and%20Stolen%20Narratives%20to%20Perpetuate%20Digital%20Transnational%20Repression&amp;severity=medium&amp;id=69f0c280cbff5d86101cb5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54013-cwe-306-missing-authentication-for--fbf6369a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54013%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Hanwha%20Vision%20QND-8080R&amp;severity=high&amp;id=69f0602fcbff5d8610cfd2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54012-cwe-78-improper-neutralization-of-s-2a77bad7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54012%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Hanwha%20Vision%20QND-8080R&amp;severity=high&amp;id=69f0602fcbff5d8610cfd2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7238-unrestricted-upload-in-code-projects-64248e9e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7238%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69f06034cbff5d8610cfe2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54011-cwe-20-improper-input-validation-in-afa84b22</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54011%3A%20CWE-20%20Improper%20input%20validation%20in%20Hanwha%20Vision%20QND-8080R&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4805-cwe-79-improper-neutralization-of-in-258f5315</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duongancol%20Woostify&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4911-cwe-472-external-control-of-assumed--f8c23604</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4911%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20masaakitanaka%20Booking%20Package&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7237-path-traversal-in-agiflow-scaffold-m-c930a9b1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7237%3A%20Path%20Traversal%20in%20AgiFlow%20scaffold-mcp&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40966-cwe-284-improper-access-control-in--e8e38b70</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40966%3A%20CWE-284%20Improper%20Access%20Control%20in%20VMware%20Spring%20AI&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medtronic-hack-confirmed-after-shinyhunters-threat-e869d541</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medtronic%20Hack%20Confirmed%20After%20ShinyHunters%20Threatens%20Data%20Leak&amp;severity=medium&amp;id=69f05565cbff5d8610c8963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7235-path-traversal-in-erlichliu-claude-a-0e2800d0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7235%3A%20Path%20Traversal%20in%20ErlichLiu%20claude-agent-sdk-master&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7234-path-traversal-in-browseroperator-br-f785bf12</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7234%3A%20Path%20Traversal%20in%20BrowserOperator%20browser-operator-core&amp;severity=medium&amp;id=69f0521fcbff5d8610c67dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40967-cwe-94-improper-control-of-generati-2dbb5ab4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40967%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69f0521fcbff5d8610c67db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7233-out-of-bounds-read-in-artifex-mupdf-8002809c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7233%3A%20Out-of-Bounds%20Read%20in%20Artifex%20MuPDF&amp;severity=medium&amp;id=69f0521fcbff5d8610c67dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5306-cwe-79-cross-site-scripting-xss-in-c-6b1ca701</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5306%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Check%20%26%20Log%20Email&amp;severity=medium&amp;id=69f0521fcbff5d8610c67db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7230-cross-site-scripting-in-sourcecodest-adae387e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7230%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Safety%20Anger%20Pad&amp;severity=medium&amp;id=69f0521fcbff5d8610c67dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7229-sql-injection-in-code-projects-coach-b67f16d1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7229%3A%20SQL%20Injection%20in%20code-projects%20Coaching%20Management%20System&amp;severity=medium&amp;id=69f0521fcbff5d8610c67db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7228-sql-injection-in-sourcecodester-pizz-2c87f8c6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7228%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b66158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7227-sql-injection-in-sourcecodester-pizz-7ae8b08f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7227%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b66151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42510-cwe-829-inclusion-of-functionality--c43618fc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42510%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20OpenStack%20Ironic&amp;severity=medium&amp;id=69f043f9cbff5d8610b66121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7226-sql-injection-in-sourcecodester-pizz-77d91fd3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7226%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b6614a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7225-sql-injection-in-sourcecodester-pizz-06df2189</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7225%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b66143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6725-cwe-79-improper-neutralization-of-in-2a05a592</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpclever%20WPC%20Smart%20Messages%20for%20WooCommerce&amp;severity=medium&amp;id=69f043f9cbff5d8610b6612d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6809-cwe-79-improper-neutralization-of-in-fa6db23b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Social%20Post%20Embed&amp;severity=medium&amp;id=69f043f9cbff5d8610b66134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6551-cwe-79-improper-neutralization-of-in-01aa0529</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techeshta%20Timeline%20Blocks%20for%20Gutenberg&amp;severity=medium&amp;id=69f043f9cbff5d8610b66124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7224-sql-injection-in-sourcecodester-pizz-c6a6a984</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7224%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b6613c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7223-server-side-request-forgery-in-bigsw-12e8532f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7223%3A%20Server-Side%20Request%20Forgery%20in%20BigSweetPotatoStudio%20HyperChat&amp;severity=medium&amp;id=69f035e3cbff5d861094ce49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7222-cross-site-scripting-in-code-project-ea75fafe</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7222%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Coaching%20Management%20System&amp;severity=medium&amp;id=69f035e3cbff5d861094ce42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7221-server-side-request-forgery-in-tence-8bd1026c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7221%3A%20Server-Side%20Request%20Forgery%20in%20TencentCloudBase%20CloudBase-MCP&amp;severity=medium&amp;id=69f035e3cbff5d861094ce38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7220-os-command-injection-in-jackwrichard-21426fb0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7220%3A%20OS%20Command%20Injection%20in%20jackwrichards%20FastlyMCP&amp;severity=medium&amp;id=69f035e3cbff5d861094ce30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7219-buffer-overflow-in-totolink-n300rt-85312476</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7219%3A%20Buffer%20Overflow%20in%20Totolink%20N300RT&amp;severity=high&amp;id=69f035e3cbff5d861094ce29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7218-buffer-overflow-in-totolink-n300rt-9687d471</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7218%3A%20Buffer%20Overflow%20in%20Totolink%20N300RT&amp;severity=high&amp;id=69f020adcbff5d861065204b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7217-absolute-path-traversal-in-deepracti-7fd52c7e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7217%3A%20Absolute%20Path%20Traversal%20in%20Deepractice%20PromptX&amp;severity=medium&amp;id=69f020adcbff5d8610652044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7216-path-traversal-in-donchelo-processin-091925d1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7216%3A%20Path%20Traversal%20in%20donchelo%20processing-claude-mcp-bridge&amp;severity=medium&amp;id=69f020adcbff5d861065203c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1460-cwe-78-improper-neutralization-of-sp-6c865b02</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1460%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Zyxel%20DX3301-T0%20firmware&amp;severity=high&amp;id=69f020adcbff5d8610652032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7215-command-injection-in-egtai-gmx-vmd-m-eeb51f56</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7215%3A%20Command%20Injection%20in%20egtai%20gmx-vmd-mcp&amp;severity=medium&amp;id=69f020adcbff5d8610652035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-28th-2026-httpsisc-b2b14274</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%2028th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9908%2C%20(Tue%2C%20Apr%2028th)&amp;severity=medium&amp;id=69f0161fcbff5d86105a42fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0711-cwe-78-improper-neutralization-of-sp-9fff62e9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0711%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Zyxel%20DX3300-T0%20firmware&amp;severity=medium&amp;id=69f020adcbff5d861065202f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7214-path-traversal-in-eghuzefa-engineer--6ca2c9f0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7214%3A%20Path%20Traversal%20in%20eghuzefa%20engineer-your-data&amp;severity=medium&amp;id=69f015a2cbff5d861059e30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7213-path-traversal-in-ef10007-mlopsmcp-024a87bb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7213%3A%20Path%20Traversal%20in%20ef10007%20MLOps_MCP&amp;severity=medium&amp;id=69f015a2cbff5d861059e303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7212-path-traversal-in-edvardlindelof-not-0bce1f64</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7212%3A%20Path%20Traversal%20in%20edvardlindelof%20notes-mcp&amp;severity=medium&amp;id=69f015a2cbff5d861059e2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7211-command-injection-in-dvladimirov-mcp-a9f308b2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7211%3A%20Command%20Injection%20in%20dvladimirov%20MCP&amp;severity=medium&amp;id=69f008add3d5ab9102728441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7206-sql-injection-in-dubydu-sqlite-mcp-2e443e21</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7206%3A%20SQL%20Injection%20in%20dubydu%20sqlite-mcp&amp;severity=medium&amp;id=69f008add3d5ab9102728438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7205-path-traversal-in-duartium-papers-mc-ac891dff</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7205%3A%20Path%20Traversal%20in%20duartium%20papers-mcp-server&amp;severity=medium&amp;id=69f008add3d5ab9102728431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7204-os-command-injection-in-totolink-a80-304b8a45</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7204%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f008add3d5ab910272842a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7203-os-command-injection-in-totolink-a80-b3a02d32</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7203%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f008add3d5ab9102728423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-29-bee05794</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-29&amp;severity=medium&amp;id=69f31076cbff5d8610a442a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60889-na-4e760c61</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60889%3A%20n%2Fa&amp;severity=critical&amp;id=69f165e4cbff5d86104b64f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60887-na-bf1f752e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60887%3A%20n%2Fa&amp;severity=medium&amp;id=69f165e4cbff5d86104b64ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38949-na-43782f51</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38949%3A%20n%2Fa&amp;severity=null&amp;id=69f1649fcbff5d861047ef8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38948-na-6b6fa87b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38948%3A%20n%2Fa&amp;severity=medium&amp;id=69f1649fcbff5d861047ef87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38651-na-f476ac9e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38651%3A%20n%2Fa&amp;severity=high&amp;id=69f1649fcbff5d861047ef81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37750-na-cce03552</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37750%3A%20n%2Fa&amp;severity=medium&amp;id=69f1649ccbff5d861047eb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-28-4ccfa6d9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-28&amp;severity=medium&amp;id=69f14b75cbff5d8610f31302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67223-na-bef1a693</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67223%3A%20n%2Fa&amp;severity=high&amp;id=69f0d09ecbff5d86102a30cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-28-1048392e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-28&amp;severity=low&amp;id=69f09f32cbff5d861004acee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41526-cwe-150-improper-neutralization-of--a6e8dde0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41526%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20KDE%20KCoreAddons&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41525-cwe-669-incorrect-resource-transfer-b6daee56</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41525%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20KDE%20Dolphin&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40356-cwe-191-integer-underflow-wrap-or-w-d22033d8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40356%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20MIT%20Kerberos%205&amp;severity=medium&amp;id=69f0521fcbff5d8610c67dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40355-cwe-476-null-pointer-dereference-in-7c5cdf8c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40355%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MIT%20Kerberos%205&amp;severity=medium&amp;id=69f043f9cbff5d8610b6611c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20766-cwe-122-in-milesight-ms-cxx63-pd-3f20a1ef</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20766%3A%20CWE-122%20in%20Milesight%20MS-Cxx63-PD&amp;severity=high&amp;id=69f008add3d5ab910272840c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7202-os-command-injection-in-totolink-a80-9229772f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7202%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f008add3d5ab910272841b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32649-cwe-78-in-milesight-ms-cxx63-pd-d5b116ae</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32649%3A%20CWE-78%20in%20Milesight%20MS-Cxx63-PD&amp;severity=high&amp;id=69f008add3d5ab9102728416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32644-cwe-321-in-milesight-ms-cxx63-pd-60e79b90</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32644%3A%20CWE-321%20in%20Milesight%20MS-Cxx63-PD&amp;severity=critical&amp;id=69f008add3d5ab9102728411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27785-cwe-798-in-milesight-ms-cxx63-pd-a47740d0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27785%3A%20CWE-798%20in%20Milesight%20MS-Cxx63-PD&amp;severity=high&amp;id=69f0134ecbff5d861057a5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40977-cwe-59-improper-link-resolution-bef-280cda4b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40977%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69f0134ecbff5d861057a5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40976-cwe-862-missing-authorization-in-sp-358f8485</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40976%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Spring%20Spring%20Boot&amp;severity=critical&amp;id=69f0134ecbff5d861057a5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40975-cwe-330-use-of-insufficiently-rando-03815315</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40975%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69f0134ecbff5d861057a5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40974-cwe-295-improper-certificate-valida-b9490338</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40974%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69f0134ecbff5d861057a5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7200-cross-site-scripting-in-sourcecodest-89c9fa53</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7200%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0134ecbff5d861057a5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40973-cwe-377-insecure-temporary-file-in--ecbb583e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40973%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Spring%20Spring%20Boot&amp;severity=high&amp;id=69f0134ecbff5d861057a5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40972-cwe-208-observable-timing-discrepan-0658711e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40972%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20Spring%20Spring%20Boot&amp;severity=high&amp;id=69eff011d3d5ab91023eabf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7199-sql-injection-in-sourcecodester-phar-8085c5cc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7199%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69eff011d3d5ab91023eabfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7196-sql-injection-in-codeastro-online-cl-5490b32d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7196%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69eff011d3d5ab91023eabf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40971-cwe-295-improper-certificate-valida-efdceea9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40971%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69efec8cd3d5ab91023ba5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7194-sql-injection-in-sourcecodester-phar-30482406</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7194%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69efec8cd3d5ab91023ba5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28747-cwe-639-in-milesight-ms-cxx63-pd-5f25c353</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28747%3A%20CWE-639%20in%20Milesight%20MS-Cxx63-PD&amp;severity=high&amp;id=69efec8cd3d5ab91023ba5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7183-uncaught-exception-in-aligungr-ueran-46c8f60d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7183%3A%20Uncaught%20Exception%20in%20aligungr%20UERANSIM&amp;severity=medium&amp;id=69efe58fd3d5ab91023219a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7179-path-traversal-in-ospg-binwalk-3fa14598</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7179%3A%20Path%20Traversal%20in%20OSPG%20binwalk&amp;severity=medium&amp;id=69efe58fd3d5ab910232199f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7178-server-side-request-forgery-in-chatg-6d14a4ba</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7178%3A%20Server-Side%20Request%20Forgery%20in%20ChatGPTNextWeb%20NextChat&amp;severity=medium&amp;id=69efdfeaba26a39fba6a0636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7177-server-side-request-forgery-in-chatg-4c6ac8b8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7177%3A%20Server-Side%20Request%20Forgery%20in%20ChatGPTNextWeb%20NextChat&amp;severity=medium&amp;id=69efdc66ba26a39fba68d653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7160-command-injection-in-tenda-hg3-d40cdfd6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7160%3A%20Command%20Injection%20in%20Tenda%20HG3&amp;severity=high&amp;id=69efd8e1ba26a39fba67dee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7159-path-traversal-in-douinc-mkdocs-mcp--3ac8463c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7159%3A%20Path%20Traversal%20in%20douinc%20mkdocs-mcp-plugin&amp;severity=medium&amp;id=69efd8e1ba26a39fba67ded9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7158-server-side-request-forgery-in-dmitr-7b25460e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7158%3A%20Server-Side%20Request%20Forgery%20in%20dmitryglhf%20mcp-url-downloader&amp;severity=medium&amp;id=69efd1e7ba26a39fba655246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3087-cwe-22-in-python-software-foundation-cf87d6ca</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3087%3A%20CWE-22%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69efd1e7ba26a39fba655233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7157-command-injection-in-disler-aider-mc-b20a7960</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7157%3A%20Command%20Injection%20in%20disler%20aider-mcp-server&amp;severity=medium&amp;id=69efd1e7ba26a39fba65523f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7156-os-command-injection-in-totolink-a80-8abcd97a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7156%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efd1e7ba26a39fba655238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7155-os-command-injection-in-totolink-a80-1189da9b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7155%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc789ba26a39fba6016e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7191-cwe-94-improper-control-of-generatio-bdaccdc6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7191%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20AWS%20QnABot%20on%20AWS&amp;severity=high&amp;id=69efc789ba26a39fba6016ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7154-os-command-injection-in-totolink-a80-26498eb9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7154%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc789ba26a39fba6016dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7153-os-command-injection-in-totolink-a80-ebd1ddca</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7153%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc04fba26a39fba5c0c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6741-cwe-269-improper-privilege-managemen-3462c309</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6741%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=69efc04fba26a39fba5c0c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7152-os-command-injection-in-totolink-a80-b2761578</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7152%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc04fba26a39fba5c0c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7151-stack-based-buffer-overflow-in-tenda-bc5ad396</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7151%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG3&amp;severity=high&amp;id=69efc04fba26a39fba5c0c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40970-cwe-295-improper-certificate-valida-d8275d91</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40970%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69efb5d1ba26a39fba55640b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7150-server-side-request-forgery-in-dh101-71f7a36b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7150%3A%20Server-Side%20Request%20Forgery%20in%20dh1011%20auto-favicon&amp;severity=medium&amp;id=69efb5d1ba26a39fba556415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7149-path-traversal-in-dexhunter-kaggle-m-7a2ee86d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7149%3A%20Path%20Traversal%20in%20dexhunter%20kaggle-mcp&amp;severity=medium&amp;id=69efb5d1ba26a39fba55640e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7148-sql-injection-in-codeastro-online-cl-e8513a58</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7148%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69efaeccba26a39fba5319ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7147-server-side-request-forgery-in-joeca-6b5a2679</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7147%3A%20Server-Side%20Request%20Forgery%20in%20JoeCastrom%20mcp-chat-studio&amp;severity=medium&amp;id=69efaeccba26a39fba5319e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32655-cwe-272-least-privilege-violation-i-f7039c68</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32655%3A%20CWE-272%3A%20Least%20Privilege%20Violation%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=medium&amp;id=69efaeccba26a39fba5319d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25908-cwe-250-execution-with-unnecessary--d2f1849b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25908%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=medium&amp;id=69efa7b1ba26a39fba50222d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7146-server-side-request-forgery-in-aleja-702eb052</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7146%3A%20Server-Side%20Request%20Forgery%20in%20AlejandroArciniegas%20mcp-data-vis&amp;severity=medium&amp;id=69efa7b1ba26a39fba502230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7145-authorization-bypass-in-mettle-sendp-42c88490</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7145%3A%20Authorization%20Bypass%20in%20mettle%20sendportal&amp;severity=medium&amp;id=69efa435ba26a39fba4f0c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7144-authorization-bypass-in-1000-project-3deadf42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7144%3A%20Authorization%20Bypass%20in%201000%20Projects%20Portfolio%20Management%20System%20MCA&amp;severity=medium&amp;id=69efa435ba26a39fba4f0c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7143-sql-injection-in-1000-projects-portf-39937c5d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7143%3A%20SQL%20Injection%20in%201000%20Projects%20Portfolio%20Management%20System%20MCA&amp;severity=medium&amp;id=69efa435ba26a39fba4f0c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7142-improper-authorization-in-wooey-6518edb2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7142%3A%20Improper%20Authorization%20in%20Wooey&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7141-uninitialized-resource-in-vllm-b1e6fdbd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7141%3A%20Uninitialized%20Resource%20in%20vllm&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7140-os-command-injection-in-totolink-a80-a2a3f726</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7140%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efa435ba26a39fba4f0ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/73-open-vsx-sleeper-extensions-linked-to-malware-s-9cad5c0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=73%20Open%20VSX%20Sleeper%20Extensions%20Linked%20to%20Malware%20Show%20New%20Activations&amp;severity=medium&amp;id=69ef8f0dba26a39fba414088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-bulletproof-hosting-network-behind-1600-56c3bc34</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20Bulletproof%20Hosting%20Network%20Behind%2016%2C000%2B%20Fake%20Shops&amp;severity=medium&amp;id=69ef8f0dba26a39fba41407d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7139-os-command-injection-in-totolink-a80-33aa0c9f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7139%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc375ba26a39fba5dc2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/extortion-in-the-enterprise-defending-against-blac-3436d7f6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Extortion%20in%20the%20Enterprise%3A%20Defending%20Against%20BlackFile%20Attacks&amp;severity=medium&amp;id=69ef8f0dba26a39fba41408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-crypto-wallet-clones-in-the-app-store-and-fd9f5a88</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20crypto-wallet%20clones%20in%20the%20App%20Store%20and%20other%20attacks%20on%20iOS%20and%20macOS%20crypto%20owners%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ef8c66ba26a39fba3fde0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7138-os-command-injection-in-totolink-a80-9e15fc72</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7138%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef8b94ba26a39fba3f69b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7137-os-command-injection-in-totolink-a80-5b52ad7e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7137%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef8b94ba26a39fba3f69b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7136-os-command-injection-in-totolink-a80-5d4eb111</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7136%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef8b94ba26a39fba3f69aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6970-cwe-842-placement-of-user-into-incor-e26f8061</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6970%3A%20CWE-842%20Placement%20of%20user%20into%20incorrect%20group%20in%20Canonical%20authd&amp;severity=high&amp;id=69ef8b94ba26a39fba3f69a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54505-cwe-1420-exposure-of-sensitive-info-66b28f59</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54505%3A%20CWE-1420%20%20Exposure%20of%20Sensitive%20Information%20during%20Transient%20Execution%20in%20AMD%20AMD%20EPYC%E2%84%A2%207001%20Series%20Processors&amp;severity=low&amp;id=69ef811fba26a39fba3a6d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7135-out-of-bounds-read-in-gpac-a1c73700</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7135%3A%20Out-of-Bounds%20Read%20in%20GPAC&amp;severity=medium&amp;id=69ef811fba26a39fba3a6dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7134-unrestricted-upload-in-code-projects-93f887d6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7134%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Lot%20Reservation%20System&amp;severity=medium&amp;id=69ef811fba26a39fba3a6da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7133-unrestricted-upload-in-code-projects-e126e654</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7133%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Lot%20Reservation%20System&amp;severity=medium&amp;id=69ef79fcba26a39fba368bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7132-path-traversal-in-code-projects-onli-f43d2f7e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7132%3A%20Path%20Traversal%20in%20code-projects%20Online%20Lot%20Reservation%20System&amp;severity=medium&amp;id=69ef79fcba26a39fba368bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40514-cwe-338-use-of-cryptographically-we-40279933</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40514%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20SmarterTools%20Inc.%20SmarterMail&amp;severity=high&amp;id=69ef79fcba26a39fba368ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6357-vulnerability-in-pip-maintainers-pip-c9bfaede</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6357%3A%20Vulnerability%20in%20Pip%20maintainers%20pip&amp;severity=medium&amp;id=69ef79fcba26a39fba368ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7131-sql-injection-in-code-projects-onlin-d8a0922d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7131%3A%20SQL%20Injection%20in%20code-projects%20Online%20Lot%20Reservation%20System&amp;severity=medium&amp;id=69ef79fcba26a39fba368bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-008-26-day-pa-d3a1c9c7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20008%20-%2026-Day%20Pause%20Ends%20with%20Three%20Concurrent%20Compromises%20(Checkmarx%20KICS%2C%20Bitwarden%20CLI%20Cascade%2C%20xinference%20PyPI)%2C%20CanisterSprawl%20npm%20Worm%20Identified%2C%20and%20Tier%201%20Coverage%20Returns%2C%20(Mon%2C%20Apr%2027th)&amp;severity=low&amp;id=69ef6f6aba26a39fba2fe8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7130-sql-injection-in-sourcecodester-phar-b37da0b2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7130%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef6f96ba26a39fba2ff985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32688-cwe-770-allocation-of-resources-wit-e2617990</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32688%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20elixir-plug%20plug_cowboy&amp;severity=high&amp;id=69ef6f96ba26a39fba2ff971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7129-cross-site-scripting-in-sourcecodest-f2202ae0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7129%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef6f96ba26a39fba2ff97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7128-sql-injection-in-sourcecodester-phar-dc8f7058</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7128%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef6f96ba26a39fba2ff977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7127-sql-injection-in-sourcecodester-phar-a7924437</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7127%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef64deba26a39fba2863d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40557-cwe-295-improper-certificate-valida-e71177ef</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40557%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20Prometheus%20Reporter&amp;severity=medium&amp;id=69ef64deba26a39fba2863c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41081-cwe-287-improper-authentication-in--a5917065</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41081%3A%20CWE-287%20Improper%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20Client&amp;severity=medium&amp;id=69ef64deba26a39fba2863cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/incomplete-windows-patch-opens-door-to-zero-click--804ca52f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Incomplete%20Windows%20Patch%20Opens%20Door%20to%20Zero-Click%20Attacks&amp;severity=medium&amp;id=69ef6159ba26a39fba26e288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7126-sql-injection-in-sourcecodester-phar-3143ff4d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7126%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef64deba26a39fba2863d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6265-cwe-278-insecure-preserved-inherited-4c0ba9b6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6265%3A%20CWE-278%20Insecure%20preserved%20inherited%20permissions%20in%20Cerberus%20Cerberus%20FTP%20Server&amp;severity=high&amp;id=69ef64deba26a39fba2863ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15626-cwe-639-authorization-bypass-throug-75df7060</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15626%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Ribblr%20Crotchet%20and%20Knitting&amp;severity=medium&amp;id=69ef64deba26a39fba2863c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7125-os-command-injection-in-totolink-a80-087310f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7125%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5dd8ba26a39fba258f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7124-os-command-injection-in-totolink-a80-17dc6981</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7124%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5dd8ba26a39fba258f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7040-cwe-176-improper-handling-of-unicode-17a88024</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7040%3A%20CWE-176%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20RRWO%20Text%3A%3AMinify%3A%3AXS&amp;severity=high&amp;id=69ef5dd8ba26a39fba258f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openssh-flaw-allowing-full-root-shell-access-lurke-a32be6bf</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenSSH%20Flaw%20Allowing%20Full%20Root%20Shell%20Access%20Lurked%20for%2015%20Years&amp;severity=low&amp;id=69ef56cdba26a39fba231582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7123-os-command-injection-in-totolink-a80-634fd53f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7123%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5dd8ba26a39fba258f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-ai-prompt-injection-attacks-increasing-b-516fa56f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20AI%20Prompt%20Injection%20Attacks%20Increasing%2C%20but%20Sophistication%20Still%20Low%3A%20Google&amp;severity=low&amp;id=69ef5349ba26a39fba2158fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/27th-april-threat-intelligence-report-f1610b0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=27th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69ef53a4ba26a39fba2171ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7122-os-command-injection-in-totolink-a80-98f75eb1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7122%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5358ba26a39fba215e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7121-os-command-injection-in-totolink-a80-db497ec6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7121%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5358ba26a39fba215e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-poisoning-via-pypi-repository-comprom-f9defab9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Poisoning%20via%20PyPI%20Repository%20Compromise&amp;severity=medium&amp;id=69ef4fc5ba26a39fba1ff6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7119-os-command-injection-in-tenda-hg3-cb5b91c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7119%3A%20OS%20Command%20Injection%20in%20Tenda%20HG3&amp;severity=high&amp;id=69ef5358ba26a39fba215e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/energy-and-water-management-firm-itron-hacked-73e29410</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Energy%20and%20Water%20Management%20Firm%20Itron%20Hacked&amp;severity=medium&amp;id=69ef48beba26a39fba1d5c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7118-sql-injection-in-code-projects-emplo-c6623a17</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7118%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef48d2ba26a39fba1d6ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5937-cwe-248-uncaught-exception-in-foxit--42296023</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5937%3A%20CWE-248%20Uncaught%20exception%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5938-insufficient-control-flow-management-c05a599b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5938%3A%20Insufficient%20Control%20Flow%20Management%20(CWE-691)%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5940-cwe-416-use-after-free-in-foxit-soft-82ad3481</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5940%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69ef48cfba26a39fba1d6dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5942-cwe-416-use-after-free-in-foxit-soft-c08799d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5942%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5943-cwe-416-use-after-free-in-foxit-soft-24b539a6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5943%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69ef48cfba26a39fba1d6dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5939-cwe-416-use-after-free-in-foxit-soft-c4de69d0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5939%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5941-cwe-20-improper-input-validation-in--7fadb872</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5941%3A%20CWE-20%20Improper%20input%20validation%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69ef48cfba26a39fba1d6dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7117-sql-injection-in-code-projects-emplo-b6c07af0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7117%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7116-cross-site-scripting-in-code-project-f6007849</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7116%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc6692-uses-email-bombing-social-engineering-to-d-6308b083</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC6692%20Uses%20Email%20Bombing%2C%20Social%20Engineering%20to%20Deploy%20%E2%80%98Snow%E2%80%99%20Malware&amp;severity=medium&amp;id=69ef3e31ba26a39fba195bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42410-cwe-79-improper-neutralization-of-i-fa3a5fa2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42410%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22337-cwe-266-incorrect-privilege-assignm-01630852</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22337%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Directorist%20Directorist%20Social%20Login&amp;severity=critical&amp;id=69ef3e3cba26a39fba196b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7115-sql-injection-in-code-projects-emplo-840574b2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7115%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef3e3cba26a39fba196b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7114-sql-injection-in-code-projects-emplo-9ba13d91</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7114%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef3e3cba26a39fba196b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/easily-exploitable-pack2theroot-linux-vulnerabilit-f47ac708</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Easily%20Exploitable%20%E2%80%98Pack2TheRoot%E2%80%99%20Linux%20Vulnerability%20Leads%20to%20Root%20Access&amp;severity=low&amp;id=69ef3729ba26a39fba1635f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7113-missing-authentication-in-nousresear-eac9c7e2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7113%3A%20Missing%20Authentication%20in%20NousResearch%20hermes-agent&amp;severity=medium&amp;id=69ef3e3cba26a39fba196b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27172-cwe-502-deserialization-of-untruste-0c460851</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27172%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=high&amp;id=69ef3e3cba26a39fba196b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33453-cwe-915-improperly-controlled-modif-884af63d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33453%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=69ef3e3cba26a39fba196b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7112-improper-authentication-in-nousresea-dc43e89e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7112%3A%20Improper%20Authentication%20in%20NousResearch%20hermes-agent&amp;severity=medium&amp;id=69ef33a6ba26a39fba15414e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33454-cwe-502-deserialization-of-untruste-3b0dba90</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33454%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=69ef33a6ba26a39fba154125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40022-cwe-288-authentication-bypass-using-0ecafeba</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40022%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20Platform%20HTTP%20Main&amp;severity=high&amp;id=69ef33a6ba26a39fba15412c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-launches-sweeping-crackdown-on-southeast-asia-c-bad33b40</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Launches%20Sweeping%20Crackdown%20on%20Southeast%20Asia%20Cyberscams%20and%20Sanctions%20Cambodian%20Senator&amp;severity=medium&amp;id=69ef3021ba26a39fba134baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40858-cwe-502-deserialization-of-untruste-52424157</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40858%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=high&amp;id=69ef33a6ba26a39fba154134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7110-cross-site-scripting-in-code-project-84c188a1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7110%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef33a6ba26a39fba154145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41409-cwe-502-deserialization-of-untruste-c3d25547</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41409%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20MINA&amp;severity=critical&amp;id=69ef33a6ba26a39fba154139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7109-improper-authorization-in-code-proje-f3638436</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7109%3A%20Improper%20Authorization%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef33a6ba26a39fba15413d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7108-cross-site-request-forgery-in-code-p-16013d28</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7108%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef291eba26a39fba10e2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41635-cwe-502-deserialization-of-untruste-46beca38</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41635%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20MINA&amp;severity=critical&amp;id=69ef291bba26a39fba10e188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7107-unrestricted-upload-in-code-projects-129d023e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7107%3A%20Unrestricted%20Upload%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef291eba26a39fba10e299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/firefox-vulnerability-allows-tor-user-fingerprinti-624b1087</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Firefox%20Vulnerability%20Allows%20Tor%20User%20Fingerprinting&amp;severity=low&amp;id=69ef2210ba26a39fba0e3f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7103-use-of-weak-hash-in-code-projects-ch-07788a40</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7103%3A%20Use%20of%20Weak%20Hash%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=69ef291eba26a39fba10e292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42379-cwe-201-insertion-of-sensitive-info-a7a3541e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42379%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPDeveloper%20Templately&amp;severity=high&amp;id=69ef291bba26a39fba10e18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40453-cwe-178-improper-handling-of-case-s-5d887279</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40453%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20JMS&amp;severity=critical&amp;id=69ef291bba26a39fba10e17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7102-command-injection-in-tenda-f456-f693d510</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7102%3A%20Command%20Injection%20in%20Tenda%20F456&amp;severity=medium&amp;id=69ef291eba26a39fba10e28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40860-cwe-502-deserialization-of-untruste-5ce5b6b9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40860%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=69ef291bba26a39fba10e184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7101-buffer-overflow-in-tenda-f456-ccddb581</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7101%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ef291bba26a39fba10e1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40048-cwe-502-deserialization-of-untruste-37a09540</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40048%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20PQC&amp;severity=high&amp;id=69ef291bba26a39fba10e179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40473-cwe-502-deserialization-of-untruste-350ea403</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40473%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20Mina&amp;severity=high&amp;id=69ef291bba26a39fba10e180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7100-buffer-overflow-in-tenda-f456-54363147</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7100%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ef291bba26a39fba10e19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7099-buffer-overflow-in-tenda-f456-b9f5b372</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7099%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ef291bba26a39fba10e195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7098-buffer-overflow-in-tenda-f456-2ba425da</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7098%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ef291bba26a39fba10e18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7097-buffer-overflow-in-tenda-f456-8b0e1328</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7097%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69efc375ba26a39fba5dc301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7096-os-command-injection-in-tenda-hg3-77bd459b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7096%3A%20OS%20Command%20Injection%20in%20Tenda%20HG3&amp;severity=high&amp;id=69ef48d2ba26a39fba1d6ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22077-vulnerability-in-oppo-oppo-wallet-a-27737c6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22077%3A%20Vulnerability%20in%20OPPO%20OPPO%20Wallet%20APP&amp;severity=medium&amp;id=69ef291eba26a39fba10e2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7095-cross-site-scripting-in-code-project-e5920b3d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7095%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef5dd8ba26a39fba258f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7094-server-side-request-forgery-in-shado-19f3c488</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7094%3A%20Server-Side%20Request%20Forgery%20in%20ShadowCloneLabs%20GlutamateMCPServers&amp;severity=medium&amp;id=69ef026eba26a39fbafb331e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7093-improper-authorization-in-code-proje-f30b3776</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7093%3A%20Improper%20Authorization%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef026eba26a39fbafb3317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7092-improper-authorization-in-code-proje-be6e108c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7092%3A%20Improper%20Authorization%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef026eba26a39fbafb3310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7091-improper-authorization-in-code-proje-c65fc174</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7091%3A%20Improper%20Authorization%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef026eba26a39fbafb3309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7090-cross-site-scripting-in-code-project-94c96ca1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7090%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=69eef45eba26a39fbaf26de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7089-cross-site-scripting-in-code-project-2fa50083</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7089%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Home%20Service%20System&amp;severity=medium&amp;id=69eef45eba26a39fbaf26dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7088-sql-injection-in-sourcecodester-phar-795088e1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7088%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69eef45eba26a39fbaf26dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7087-sql-injection-in-sourcecodester-phar-f2f8e554</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7087%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69eef45eba26a39fbaf26dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7086-path-traversal-in-hbai-ltd-toonflow--23d4a937</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7086%3A%20Path%20Traversal%20in%20HBAI-Ltd%20Toonflow-app&amp;severity=medium&amp;id=69eef45eba26a39fbaf26dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7085-path-traversal-in-hbai-ltd-toonflow--c33ffdf1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7085%3A%20Path%20Traversal%20in%20HBAI-Ltd%20Toonflow-app&amp;severity=low&amp;id=69eee2caba26a39fbaceec8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7084-server-side-request-forgery-in-hbai--2b58605e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7084%3A%20Server-Side%20Request%20Forgery%20in%20HBAI-Ltd%20Toonflow-app&amp;severity=medium&amp;id=69eee2caba26a39fbaceec84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7083-sql-injection-in-likeadmin-likeshop--c59f8cf9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7083%3A%20SQL%20Injection%20in%20likeadmin-likeshop%20likeadmin_php&amp;severity=medium&amp;id=69eee2caba26a39fbaceec7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7082-buffer-overflow-in-tenda-f456-cc536e34</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7082%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eee2caba26a39fbaceec74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7081-buffer-overflow-in-tenda-f456-d90f75b6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7081%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eee2caba26a39fbaceec6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3868-cwe-130-improper-handling-of-length--680be2d5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3868%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Moxa%20EDR-8010%20Series&amp;severity=high&amp;id=69eee2caba26a39fbaceec65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3867-cwe-282-improper-ownership-managemen-f84bc9d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3867%3A%20CWE-282%3A%20Improper%20Ownership%20Management%20in%20Moxa%20EDR-8010%20Series&amp;severity=medium&amp;id=69eee2caba26a39fbaceec61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7080-buffer-overflow-in-tenda-f456-6bb8799d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7080%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eed135ba26a39fbaba83dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7079-buffer-overflow-in-tenda-f456-1842489a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7079%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eed135ba26a39fbaba83d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7106-cwe-269-improper-privilege-managemen-52554bfa</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7106%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20jgrodgers%20Highland%20Software%20Custom%20Role%20Manager&amp;severity=high&amp;id=69eed135ba26a39fbaba83e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7078-buffer-overflow-in-tenda-f456-8f12c955</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7078%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eed135ba26a39fbaba83ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7077-sql-injection-in-itsourcecode-courie-4b0cdd45</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7077%3A%20SQL%20Injection%20in%20itsourcecode%20Courier%20Management%20System&amp;severity=medium&amp;id=69eed135ba26a39fbaba83c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7076-sql-injection-in-itsourcecode-courie-cdc662d1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7076%3A%20SQL%20Injection%20in%20itsourcecode%20Courier%20Management%20System&amp;severity=medium&amp;id=69eec325ba26a39fbab1b977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7075-sql-injection-in-itsourcecode-constr-b070b81a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7075%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69eec325ba26a39fbab1b970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7074-sql-injection-in-itsourcecode-constr-d86fa550</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7074%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69eec325ba26a39fbab1b969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7073-sql-injection-in-itsourcecode-constr-fb1ad131</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7073%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69eeb89aba26a39fbaa94844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7072-sql-injection-in-codepanda-source-ca-dd721fe0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7072%3A%20SQL%20Injection%20in%20CodePanda%20Source%20canteen_management_system&amp;severity=medium&amp;id=69eeb89aba26a39fbaa9483e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7071-file-and-directory-information-expos-7aa54267</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7071%3A%20File%20and%20Directory%20Information%20Exposure%20in%20CodeAstro%20Online%20Job%20Portal&amp;severity=medium&amp;id=69eeb89aba26a39fbaa94837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7070-sql-injection-in-code-projects-inven-f9f55dfc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7070%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=69eeb89aba26a39fbaa94830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33566-improper-neutralization-of-special--97bed31b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33566%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Japan%20Computer%20Emergency%20Response%20Team%20Coordination%20Center%20(JPCERT%2FCC)%20LogonTracer&amp;severity=medium&amp;id=69eeaaaaba26a39fba9c68c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33277-improper-neutralization-of-special--31d12542</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33277%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Japan%20Computer%20Emergency%20Response%20Team%20Coordination%20Center%20(JPCERT%2FCC)%20LogonTracer&amp;severity=high&amp;id=69eeaaaaba26a39fba9c68be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7069-buffer-overflow-in-d-link-dir-825-9f93d315</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7069%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=69eeaaaaba26a39fba9c68ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-28-884f580b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-28&amp;severity=medium&amp;id=69f12bd2cbff5d861092e3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-27-5bc03b71</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-27&amp;severity=low&amp;id=69f04fe3cbff5d8610bdb109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-27-5ae51ca5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-27&amp;severity=medium&amp;id=69effa94d3d5ab910247deaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46636-na-a8490af7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46636%3A%20n%2Fa&amp;severity=critical&amp;id=69efd1e7ba26a39fba65522e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29971-na-a43413e8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29971%3A%20n%2Fa&amp;severity=medium&amp;id=69efc789ba26a39fba6016d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69428-na-681f8327</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69428%3A%20n%2Fa&amp;severity=high&amp;id=69efb5d1ba26a39fba556408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35903-na-52714e0c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35903%3A%20n%2Fa&amp;severity=critical&amp;id=69efaeccba26a39fba5319e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35902-na-84901bbf</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35902%3A%20n%2Fa&amp;severity=medium&amp;id=69efaeccba26a39fba5319df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35901-na-8bbfd28f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35901%3A%20n%2Fa&amp;severity=medium&amp;id=69efaeccba26a39fba5319dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31256-na-24a2ddee</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31256%3A%20n%2Fa&amp;severity=high&amp;id=69efaeccba26a39fba5319d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31255-na-2e725bca</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31255%3A%20n%2Fa&amp;severity=medium&amp;id=69efaeccba26a39fba5319d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30346-na-c7699a08</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30346%3A%20n%2Fa&amp;severity=medium&amp;id=69efa7b1ba26a39fba502237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69689-na-5a012bec</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69689%3A%20n%2Fa&amp;severity=high&amp;id=69efa435ba26a39fba4f0c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38936-na-f2e90d6f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38936%3A%20n%2Fa&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38935-na-e5a9bb55</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38935%3A%20n%2Fa&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38934-na-21c6e375</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38934%3A%20n%2Fa&amp;severity=high&amp;id=69ef99a0ba26a39fba48b568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30462-na-8db3ce25</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30462%3A%20n%2Fa&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30352-na-1bc61c5e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30352%3A%20n%2Fa&amp;severity=critical&amp;id=69ef811fba26a39fba3a6d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30351-na-680c71aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30351%3A%20n%2Fa&amp;severity=high&amp;id=69ef811fba26a39fba3a6d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30350-na-e69a022c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30350%3A%20n%2Fa&amp;severity=high&amp;id=69ef79fcba26a39fba368b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42363-cwe-656-reliance-on-security-throug-65391bf4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42363%3A%20CWE-656%20-%20Reliance%20on%20Security%20Through%20Obscurity%20in%20GeoVision%20Inc.%20GV-IP%20Device%20Utility&amp;severity=critical&amp;id=69eeaaaaba26a39fba9c68c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7068-buffer-overflow-in-d-link-dir-825-1a940c5e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7068%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=69eea706ba26a39fba9906fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7067-command-injection-in-d-link-dir-822-6f02aaf5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7067%3A%20Command%20Injection%20in%20D-Link%20DIR-822&amp;severity=medium&amp;id=69eea382ba26a39fba976be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7066-os-command-injection-in-choieastsea--fafc2924</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7066%3A%20OS%20Command%20Injection%20in%20choieastsea%20simple-openstack-mcp&amp;severity=medium&amp;id=69eea002ba26a39fba956ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7065-server-side-request-forgery-in-bidin-041b1434</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7065%3A%20Server-Side%20Request%20Forgery%20in%20BidingCC%20BuildingAI&amp;severity=medium&amp;id=69eea002ba26a39fba956eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7064-os-command-injection-in-agentdeskai--9eadfc8c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7064%3A%20OS%20Command%20Injection%20in%20AgentDeskAI%20browser-tools-mcp&amp;severity=medium&amp;id=69eeadd1ba26a39fbaa2f0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7063-sql-injection-in-code-projects-emplo-0d2afcee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7063%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ee9572ba26a39fba8f2ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7062-os-command-injection-in-intina47-con-ac80d435</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7062%3A%20OS%20Command%20Injection%20in%20Intina47%20context-sync&amp;severity=medium&amp;id=69ee91eeba26a39fba8cb337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7061-os-command-injection-in-toowiredd-ch-48df32bb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7061%3A%20OS%20Command%20Injection%20in%20Toowiredd%20chatgpt-mcp-server&amp;severity=medium&amp;id=69ee8e6bba26a39fba8975f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7060-sql-injection-in-liyupi-yu-picture-dbdc3180</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7060%3A%20SQL%20Injection%20in%20liyupi%20yu-picture&amp;severity=medium&amp;id=69ee75ceba26a39fba5bc32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7059-path-traversal-in-666ghj-mirofish-5143a0ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7059%3A%20Path%20Traversal%20in%20666ghj%20MiroFish&amp;severity=medium&amp;id=69ee724bba26a39fba567e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7058-command-injection-in-666ghj-mirofish-6bc975c4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7058%3A%20Command%20Injection%20in%20666ghj%20MiroFish&amp;severity=medium&amp;id=69ee71e2ba26a39fba561eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7057-buffer-overflow-in-tenda-f456-e219dd08</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7057%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee621e87115cfb6856c81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7056-buffer-overflow-in-tenda-f456-355ff71c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7056%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee5b1487115cfb68535b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7055-buffer-overflow-in-tenda-f456-67b64e39</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7055%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee57b087115cfb6851cbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7054-buffer-overflow-in-tenda-f456-e91360f1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7054%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee45fc87115cfb6847c30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7053-buffer-overflow-in-tenda-f456-5370694f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7053%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee37ec87115cfb683e66ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7045-injection-in-baomidou-dynamic-dataso-2afc7b63</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7045%3A%20Injection%20in%20baomidou%20dynamic-datasource&amp;severity=medium&amp;id=69ee6bb668edb0b8f2495f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7044-unrestricted-upload-in-greencms-52d34c16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7044%3A%20Unrestricted%20Upload%20in%20GreenCMS&amp;severity=medium&amp;id=69ee6bb668edb0b8f2495f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7043-unrestricted-upload-in-greencms-c941e9bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7043%3A%20Unrestricted%20Upload%20in%20GreenCMS&amp;severity=medium&amp;id=69ee14c487115cfb680e0632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7042-missing-authentication-in-666ghj-mir-8f11be22</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7042%3A%20Missing%20Authentication%20in%20666ghj%20MiroFish&amp;severity=medium&amp;id=69ee14c487115cfb680e062b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7041-information-disclosure-in-666ghj-mir-3b60f7d5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7041%3A%20Information%20Disclosure%20in%20666ghj%20MiroFish&amp;severity=medium&amp;id=69ee0dbc87115cfb680961fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7039-command-injection-in-tufantunc-ssh-m-16dbd528</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7039%3A%20Command%20Injection%20in%20tufantunc%20ssh-mcp&amp;severity=high&amp;id=69ee0dbc87115cfb680961f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7038-insufficiently-protected-credentials-752e881d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7038%3A%20Insufficiently%20Protected%20Credentials%20in%20tufantunc%20ssh-mcp&amp;severity=medium&amp;id=69ee033387115cfb680257b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7037-os-command-injection-in-totolink-a80-052cff94</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7037%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69edffdb87115cfb6800b221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7036-path-traversal-in-tenda-i9-eba328f9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7036%3A%20Path%20Traversal%20in%20Tenda%20i9&amp;severity=medium&amp;id=69edf8a587115cfb68fcf281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7035-stack-based-buffer-overflow-in-tenda-d6d434e8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7035%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69edf54187115cfb68fad254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7034-stack-based-buffer-overflow-in-tenda-6132cf1a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7034%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69edf54187115cfb68fad24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7033-buffer-overflow-in-tenda-f456-2b3dae2e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7033%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee6bb668edb0b8f2495f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7032-buffer-overflow-in-tenda-f456-0c01bedd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7032%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee6bb668edb0b8f2495f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7031-buffer-overflow-in-tenda-f456-f28ef6c0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7031%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ede38b87115cfb68ef539f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7030-buffer-overflow-in-tenda-f456-f9be112a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7030%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee6bb668edb0b8f2495f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7029-buffer-overflow-in-tenda-f456-1c484f6f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7029%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69edd92187115cfb68e9d5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7028-sql-injection-in-codeastro-online-jo-7d79de51</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7028%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Job%20Portal&amp;severity=medium&amp;id=69edd1f887115cfb68e48e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7027-cross-site-scripting-in-d-link-dsl-2-f9973473</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7027%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DSL-2740R&amp;severity=medium&amp;id=69edce7487115cfb68e0e8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7026-cross-site-scripting-in-d-link-dgs-3-10e9ee49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7026%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DGS-3420&amp;severity=medium&amp;id=69edbd2687115cfb68d77b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7025-server-side-request-forgery-in-typec-6c76a6c0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7025%3A%20Server-Side%20Request%20Forgery%20in%20Typecho&amp;severity=medium&amp;id=69edbd2687115cfb68d77b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7024-path-traversal-in-rawchen-sims-65c58b88</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7024%3A%20Path%20Traversal%20in%20rawchen%20sims&amp;severity=medium&amp;id=69edb5dc87115cfb68d4ecb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7023-sql-injection-in-bytedance-coze-stud-3540e2ed</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7023%3A%20SQL%20Injection%20in%20ByteDance%20coze-studio&amp;severity=medium&amp;id=69edb5dc87115cfb68d4ecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7022-improper-authentication-in-smythos-s-bad63838</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7022%3A%20Improper%20Authentication%20in%20SmythOS%20sre&amp;severity=medium&amp;id=69edab4b87115cfb68cf682d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7021-information-disclosure-in-smythos-sr-7a3264ff</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7021%3A%20Information%20Disclosure%20in%20SmythOS%20sre&amp;severity=medium&amp;id=69edab4b87115cfb68cf6827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7020-path-traversal-in-ollama-dfbf96db</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7020%3A%20Path%20Traversal%20in%20Ollama&amp;severity=medium&amp;id=69eda0e087115cfb68ca3f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7019-buffer-overflow-in-tenda-f456-8fc2e156</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7019%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eda0e087115cfb68ca3f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7018-use-of-hard-coded-cryptographic-key--acca4acd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7018%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Datavane%20Datavines&amp;severity=medium&amp;id=69ed8f2c87115cfb68a3f653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7016-cross-site-scripting-in-maxsite-cms-896efbcb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7016%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed8f2c87115cfb68a3f64a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42255-cwe-684-incorrect-provision-of-spec-30347b11</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42255%3A%20CWE-684%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Technitium%20DnsServer&amp;severity=high&amp;id=69ed8f2c87115cfb68a3f647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7015-cross-site-scripting-in-maxsite-cms-49304643</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7015%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed7d9287115cfb68904a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42254-cwe-706-use-of-incorrectly-resolved-3c76de85</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42254%3A%20CWE-706%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Hickory%20Project%20Hickory%20DNS&amp;severity=medium&amp;id=69ed7d9287115cfb68904a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7014-cross-site-scripting-in-maxsite-cms-221bc3cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7014%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed7d9287115cfb68904a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7013-cross-site-scripting-in-maxsite-cms-01c1b586</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7013%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed7d9287115cfb68904a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7012-cross-site-scripting-in-maxsite-cms-9c082817</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7012%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed6f8887115cfb687c46f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7011-cross-site-scripting-in-maxsite-cms-5250b75b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7011%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed68a087115cfb6872b091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-27-bd6d318f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-27&amp;severity=medium&amp;id=69f04fe4cbff5d8610bdb174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-26-e4006804</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-26&amp;severity=medium&amp;id=69eeaa81ba26a39fba9bce8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-26-c0c72cd5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-26&amp;severity=low&amp;id=69edd1f087115cfb68e465f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7002-sql-injection-in-klik-socialmediaweb-d1184727</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7002%3A%20SQL%20Injection%20in%20KLiK%20SocialMediaWebsite&amp;severity=medium&amp;id=69ed374887115cfb6846976d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7001-cross-site-scripting-in-datacom-dm41-31cb1d88</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7001%3A%20Cross%20Site%20Scripting%20in%20Datacom%20DM4100&amp;severity=medium&amp;id=69ed33c487115cfb68444c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7000-cross-site-scripting-in-datacom-dm41-8f3d0752</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7000%3A%20Cross%20Site%20Scripting%20in%20Datacom%20DM4100&amp;severity=medium&amp;id=69ed306687115cfb6842b9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6999-cross-site-scripting-in-bivocom-tr32-ba3ee97d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6999%3A%20Cross%20Site%20Scripting%20in%20BIVOCOM%20TR321&amp;severity=medium&amp;id=69ed2cbd87115cfb6840ee4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6998-cross-site-scripting-in-bdcom-p3310d-e7cffb2b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6998%3A%20Cross%20Site%20Scripting%20in%20BDCOM%20P3310D&amp;severity=medium&amp;id=69ed416587115cfb684e5d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6997-cross-site-scripting-in-bdcom-p3310d-eda1bac3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6997%3A%20Cross%20Site%20Scripting%20in%20BDCOM%20P3310D&amp;severity=medium&amp;id=69ed416587115cfb684e5d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6996-cross-site-scripting-in-bdcom-p3310d-a27e5bc3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6996%3A%20Cross%20Site%20Scripting%20in%20BDCOM%20P3310D&amp;severity=medium&amp;id=69ed1b2987115cfb6837500b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6995-cross-site-scripting-in-bdcom-p3310d-9755913c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6995%3A%20Cross%20Site%20Scripting%20in%20BDCOM%20P3310D&amp;severity=medium&amp;id=69ed17a487115cfb6834fba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6994-injection-in-envoy-9dad88c5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6994%3A%20Injection%20in%20Envoy&amp;severity=medium&amp;id=69ed146687115cfb6832f109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6993-unintended-intermediary-in-go-kratos-61465598</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6993%3A%20Unintended%20Intermediary%20in%20go-kratos%20kratos&amp;severity=medium&amp;id=69ed0d1987115cfb682ea5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6992-os-command-injection-in-linksys-mr96-18ae6106</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6992%3A%20OS%20Command%20Injection%20in%20Linksys%20MR9600&amp;severity=high&amp;id=69ed065d87115cfb682a963d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6991-sql-injection-in-colinhacks-zod-78af498c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6991%3A%20SQL%20Injection%20in%20colinhacks%20Zod&amp;severity=medium&amp;id=69ed028c87115cfb682860ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6990-cross-site-scripting-in-projeto-siga-b9e930ee</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6990%3A%20Cross%20Site%20Scripting%20in%20projeto-siga%20siga&amp;severity=medium&amp;id=69ecfb8487115cfb6823da6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6989-command-injection-in-tenda-f453-466759f2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6989%3A%20Command%20Injection%20in%20Tenda%20F453&amp;severity=medium&amp;id=69ecf82f87115cfb6822369c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6988-buffer-overflow-in-tenda-hg10-324a24f1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6988%3A%20Buffer%20Overflow%20in%20Tenda%20HG10&amp;severity=high&amp;id=69ecf82f87115cfb68223695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6987-command-injection-in-picoclaw-3df152f6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6987%3A%20Command%20Injection%20in%20PicoClaw&amp;severity=medium&amp;id=69ecf47c87115cfb68206f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6986-improper-verification-of-cryptograph-6083b074</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6986%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ecf11887115cfb681e8335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6985-infinite-loop-in-cesanta-mongoose-b75a22e5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6985%3A%20Infinite%20Loop%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ed416587115cfb684e5d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6984-improper-neutralization-of-special-e-65960fde</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6984%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69ece2e887115cfb68f279a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6983-server-side-request-forgery-in-pagek-ee0e4a4b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6983%3A%20Server-Side%20Request%20Forgery%20in%20pagekit&amp;severity=medium&amp;id=69ecdf6487115cfb68e623aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6982-sql-injection-in-star7th-showdoc-f8f8a2e0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6982%3A%20SQL%20Injection%20in%20star7th%20ShowDoc&amp;severity=medium&amp;id=69ecd4d987115cfb68ca117c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6981-server-side-request-forgery-in-ihate-0e7916d8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6981%3A%20Server-Side%20Request%20Forgery%20in%20IhateCreatingUserNames2%20AiraHub2&amp;severity=medium&amp;id=69ecd15487115cfb68bf7abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/token-bingo-dont-let-your-code-be-the-winner-12ab2a46</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Token%20Bingo%3A%20Don&apos;t%20Let%20Your%20Code%20be%20the%20Winner&amp;severity=medium&amp;id=69ef1e8dba26a39fba0bf968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6980-command-injection-in-divyanshu-hash--4c1bd623</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6980%3A%20Command%20Injection%20in%20Divyanshu-hash%20GitPilot-MCP&amp;severity=medium&amp;id=69ed416587115cfb684e5d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6979-server-side-request-forgery-in-devli-2bf836ef</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6979%3A%20Server-Side%20Request%20Forgery%20in%20devlikeapro%20WAHA&amp;severity=medium&amp;id=69ecb1da87115cfb685f7fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6978-sql-injection-in-jizhicms-70505da8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6978%3A%20SQL%20Injection%20in%20JiZhiCMS&amp;severity=medium&amp;id=69ecae2c87115cfb685e0990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-gopherwhisper-abuses-legitimate-s-b3d27373</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT%20GopherWhisper%20Abuses%20Legitimate%20Services%20in%20Government%20Attacks&amp;severity=medium&amp;id=69ec9c9787115cfb68578991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6977-improper-authorization-in-vanna-ai-v-dc0ac5a4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6977%3A%20Improper%20Authorization%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69ec991487115cfb6856948f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6951-remote-code-execution-rce-in-simple--178a7d4e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6951%3A%20Remote%20Code%20Execution%20(RCE)%20in%20simple-git&amp;severity=critical&amp;id=69ec52c387115cfb68273f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amos-stealer-delivered-via-cursor-ai-agent-session-1b6f01c8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AMOS%20Stealer%20delivered%20via%20Cursor%20AI%20agent%20session&amp;severity=medium&amp;id=69ef2218ba26a39fba0e588f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-npm-threat-landscape-attack-surface-and-mitiga-a64585bf</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20npm%20Threat%20Landscape%3A%20Attack%20Surface%20and%20Mitigations&amp;severity=medium&amp;id=69ef2218ba26a39fba0e5886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-26-db596018</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-26&amp;severity=medium&amp;id=69edd1f087115cfb68e46617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-25-17859590</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-25&amp;severity=medium&amp;id=69ed56e387115cfb6859f41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-25-b6055f05</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-25&amp;severity=low&amp;id=69ec250887115cfb68aa806f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42171-cwe-427-uncontrolled-search-path-el-8bd0ed64</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42171%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Nullsoft%20Nullsoft%20Scriptable%20Install%20System&amp;severity=high&amp;id=69ebe24487115cfb68759c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41248-cwe-436-interpretation-conflict-in--1e1431c1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41248%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20clerk%20astro&amp;severity=critical&amp;id=69ebdedf87115cfb6874835e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41488-cwe-918-server-side-request-forgery-b7a78a3a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41488%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchain-openai&amp;severity=low&amp;id=69ebdedf87115cfb68748364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41481-cwe-918-server-side-request-forgery-9716de86</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41481%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchain-text-splitters&amp;severity=medium&amp;id=69ebdedf87115cfb68748361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41473-cwe-306-missing-authentication-for--b01631b9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41473%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20usmannasir%20cyberpanel&amp;severity=high&amp;id=69ebdb3b87115cfb687367da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41472-cwe-79-improper-neutralization-of-i-85294878</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41472%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20usmannasir%20cyberpanel&amp;severity=medium&amp;id=69ebdb3b87115cfb687367d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eavesdropping-via-fiber-optic-cables-kaspersky-off-82f0270e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eavesdropping%20via%20fiber-optic%20cables%20%7C%20Kaspersky%20official%20blog&amp;severity=low&amp;id=69ebd44b87115cfb68707b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6968-cwe-22-improper-limitation-of-a-path-df28a2c9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6968%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AWS%20tough&amp;severity=medium&amp;id=69ebcd2c87115cfb686cfc1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6967-cwe-345-insufficient-verification-of-e7059be6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6967%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20AWS%20tough&amp;severity=medium&amp;id=69ebcd2c87115cfb686cfc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6966-cwe-347-improper-verification-of-cry-2b020c60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6966%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20AWS%20tough&amp;severity=medium&amp;id=69ebcd2c87115cfb686cfc0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41433-cwe-22-improper-limitation-of-a-pat-9b11eb85</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41433%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20open-telemetry%20opentelemetry-ebpf-instrumentation&amp;severity=high&amp;id=69ebeffb87115cfb687b9d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41429-cwe-121-stack-based-buffer-overflow-c334fe04</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41429%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20espressif%20arduino-esp32&amp;severity=high&amp;id=69ebeffb87115cfb687b9d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41244-cwe-208-observable-timing-discrepan-9215300f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41244%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20notamitgamer%20mojic&amp;severity=medium&amp;id=69ebd11387115cfb686f0be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41894-cwe-22-improper-limitation-of-a-pat-eedfe9e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41894%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69ebc30587115cfb68680b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41421-cwe-78-improper-neutralization-of-s-715daed2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41421%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69ebc30587115cfb68680b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41419-cwe-22-improper-limitation-of-a-pat-496faa47</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41419%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RARgames%204gaBoards&amp;severity=high&amp;id=69ebc30587115cfb68680b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41418-cwe-208-observable-timing-discrepan-a2526397</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41418%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20RARgames%204gaBoards&amp;severity=medium&amp;id=69ebc30587115cfb68680b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41416-cwe-190-integer-overflow-or-wraparo-6ad50ff9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41416%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69ebbba787115cfb68655ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41415-cwe-125-out-of-bounds-read-in-pjsip-4b889a16</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41415%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=69ebbba787115cfb68655ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41414-cwe-94-improper-control-of-generati-a3e6d80c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41414%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20skim-rs%20skim&amp;severity=high&amp;id=69ebbba787115cfb68655cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41492-cwe-200-exposure-of-sensitive-infor-932f1edf</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41492%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69ebbba787115cfb68655cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41327-cwe-943-improper-neutralization-of--8885efbe</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41327%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69ebbba787115cfb68655cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41328-cwe-943-improper-neutralization-of--c8d19cb1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41328%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69ebb81d87115cfb68646f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33666-cwe-190-integer-overflow-or-wraparo-9ce31bd3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33666%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20ndsev%20zserio&amp;severity=high&amp;id=69ebb81d87115cfb68646f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33524-cwe-789-memory-allocation-with-exce-ead75c69</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33524%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20ndsev%20zserio&amp;severity=high&amp;id=69ebb81d87115cfb68646f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33662-cwe-190-integer-overflow-or-wraparo-c408c7d4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33662%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20OP-TEE%20optee_os&amp;severity=high&amp;id=69ebb81d87115cfb68646f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41907-cwe-823-use-of-out-of-range-pointer-92fb380a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41907%3A%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20uuidjs%20uuid&amp;severity=high&amp;id=69ebb81d87115cfb68646f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41680-cwe-400-uncontrolled-resource-consu-1a65f320</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41680%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20markedjs%20marked&amp;severity=high&amp;id=69ebaa0487115cfb685ef42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41140-cwe-22-improper-limitation-of-a-pat-097bbdaa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41140%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20python-poetry%20poetry&amp;severity=low&amp;id=69ebaa0487115cfb685ef421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41322-cwe-525-use-of-web-browser-cache-co-65157ecf</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41322%3A%20CWE-525%3A%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20withastro%20astro&amp;severity=medium&amp;id=69ebaa0487115cfb685ef427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41321-cwe-918-server-side-request-forgery-e695a4ab</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41321%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20%40astrojs%2Fcloudflare&amp;severity=low&amp;id=69ebaa0487115cfb685ef424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41067-cwe-79-improper-neutralization-of-i-40957d3d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41067%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=69eba2fd87115cfb68542cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41079-cwe-125-out-of-bounds-read-in-openp-cad461df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41079%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69eba2fd87115cfb68542cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40897-cwe-915-improperly-controlled-modif-3c19a5fe</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40897%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20josdejong%20mathjs&amp;severity=high&amp;id=69eba2fd87115cfb68542cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6912-cwe-915-improperly-controlled-modifi-2e64f97e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6912%3A%20CWE-915%20Improperly%20controlled%20modification%20of%20Dynamically-Determined%20object%20attributes%20in%20AWS%20AWS%20Ops%20Wheel&amp;severity=high&amp;id=69eba2fd87115cfb68542cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6911-cwe-347-improper-verification-of-cry-0f0da004</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6911%3A%20CWE-347%20Improper%20verification%20of%20cryptographic%20signature%20in%20AWS%20AWS%20Ops%20Wheel&amp;severity=critical&amp;id=69eb98a187115cfb684afa55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39920-cwe-1188-initialization-of-a-resour-596011eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39920%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20BridgeHead%20Software%20FileStore&amp;severity=critical&amp;id=69eb916f87115cfb68470f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pre-stuxnet-sabotage-malware-fast16-linked-to-us-i-5e800738</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pre-Stuxnet%20Sabotage%20Malware%20%E2%80%98Fast16%E2%80%99%20Linked%20to%20US-Iran%20Cyber%20Tensions&amp;severity=high&amp;id=69eb86db87115cfb6842d52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-unauthorized-mythos-access-plankey-c-aa30b52f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Unauthorized%20Mythos%20Access%2C%20Plankey%20CISA%20Nomination%20Ends%2C%20New%20Display%20Security%20Device&amp;severity=medium&amp;id=69eb7fd387115cfb683ff65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31534-6808856e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31534&amp;severity=low&amp;id=69ec59f587115cfb6837f8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25660-cwe-290-authentication-bypass-by-sp-881e021f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25660%3A%20CWE-290%20Authentication%20bypass%20by%20spoofing%20in%20Ericsson%20CodeChecker&amp;severity=critical&amp;id=69eb754a87115cfb6838d4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21515-cwe-200-exposure-of-sensitive-infor-f9f6e427</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21515%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20IOT%20Central&amp;severity=critical&amp;id=69eb6ac987115cfb68343e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38743-cwe-1220-insufficient-granularity-o-d949f440</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38743%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69eb6ac987115cfb68343e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40690-cwe-1220-insufficient-granularity-o-88635206</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40690%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69eb6ac987115cfb68343e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-cybersecurity-must-rethink-defense-in-the-age--01515f17</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Cybersecurity%20Must%20Rethink%20Defense%20in%20the%20Age%20of%20Autonomous%20Agents&amp;severity=medium&amp;id=69eb63b387115cfb68316c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/locked-shields-2026-41-nations-strengthen-cyber-re-bcaeb7ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Locked%20Shields%202026%3A%2041%20Nations%20Strengthen%20Cyber%20Resilience%20in%20World%E2%80%99s%20Biggest%20Exercise&amp;severity=medium&amp;id=69eb63b387115cfb68316c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5265-improper-handling-of-length-paramete-b91961df</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5265%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Red%20Hat%20Fast%20Datapath%20for%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=69eb6ac987115cfb68343e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5367-improper-handling-of-length-paramete-2c43198d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5367%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Red%20Hat%20Fast%20Datapath%20for%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=69eb6ac987115cfb68343e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-federal-agencys-cisco-firewall-infected-with-fi-b03e6cae</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Federal%20Agency%E2%80%99s%20Cisco%20Firewall%20Infected%20With%20%E2%80%98Firestarter%E2%80%99%20Backdoor&amp;severity=medium&amp;id=69eb55a387115cfb6825d794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trump-administration-vows-crackdown-on-chinese-com-126adcd3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trump%20Administration%20Vows%20Crackdown%20on%20Chinese%20Companies%20%E2%80%98Exploiting%E2%80%99%20AI%20Models%20Made%20in%20US&amp;severity=medium&amp;id=69eb527a87115cfb68248e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4313-cwe-79-improper-neutralization-of-in-63c8a389</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4313%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20C%26F%20AdaptiveGRC&amp;severity=low&amp;id=69eb605587115cfb682faffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6043-cwe-1188-initialization-of-a-resourc-0fa48590</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6043%3A%20CWE-1188%20Initialization%20of%20a%20resource%20with%20an%20insecure%20default%20in%20Perforce%20Helix%20Core%20Server%20(P4D)&amp;severity=high&amp;id=69eb592887115cfb682aba36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23902-cwe-863-incorrect-authorization-in--a9014525</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23902%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=high&amp;id=69eb592887115cfb682aba32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62233-cwe-502-deserialization-of-untruste-dd0afc45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62233%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=medium&amp;id=69eb4e9b87115cfb6822f45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41044-cwe-20-improper-input-validation-in-da662a29</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41044%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=high&amp;id=69eb479387115cfb681fd011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41043-cwe-79-improper-neutralization-of-i-c556bffc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41043%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=medium&amp;id=69eb479387115cfb681fd00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40466-cwe-20-improper-input-validation-in-2c6e5a9d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40466%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Broker&amp;severity=high&amp;id=69eb479387115cfb681fd00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-patched-in-crowdstrike-tenable-pro-da7dee84</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20Patched%20in%20CrowdStrike%2C%20Tenable%20Products&amp;severity=critical&amp;id=69eb3d0787115cfb6815467d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6272-cwe-306-missing-authentication-for-c-708a5e19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6272%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Eclipse%20Foundation%20Eclipse%20KUKSA%20-%20Databroker&amp;severity=high&amp;id=69eb2efb87115cfb68096495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitwarden-npm-package-hit-in-supply-chain-attack-bdf7147b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitwarden%20NPM%20Package%20Hit%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69eb27ef87115cfb68036d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21728-vulnerability-in-grafana-tempo-7584ca75</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21728%3A%20Vulnerability%20in%20Grafana%20Tempo&amp;severity=high&amp;id=69eb2efb87115cfb68096492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3569-cwe-862-missing-authorization-in-lia-5a1588b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3569%3A%20CWE-862%20Missing%20Authorization%20in%20liaison%20Liaison%20Site%20Prober&amp;severity=medium&amp;id=69eb246b87115cfb6801d63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11762-cwe-862-missing-authorization-in-hu-81cd36ca</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11762%3A%20CWE-862%20Missing%20Authorization%20in%20hubspotdev%20HubSpot%20All-In-One%20Marketing%20%E2%80%93%20Forms%2C%20Popups%2C%20Live%20Chat&amp;severity=medium&amp;id=69eb246b87115cfb6801d636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1951-cwe-121-stack-based-buffer-overflow--c6177746</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1951%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20AS320T&amp;severity=critical&amp;id=69eb0f5487115cfb68f533a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1952-cwe-912-hidden-functionality-in-delt-72d86c2b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1952%3A%20CWE-912%20Hidden%20Functionality%20in%20DeltaWW%20AS320T&amp;severity=critical&amp;id=69eb0f5487115cfb68f533a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1950-cwe-121-stack-based-buffer-overflow--901f4898</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1950%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20AS320T&amp;severity=critical&amp;id=69eb0f5487115cfb68f5339f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1949-cwe-131-incorrect-calculation-of-buf-624c285a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1949%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20DeltaWW%20AS320T&amp;severity=critical&amp;id=69eb095d87115cfb68f0d935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5428-cwe-79-improper-neutralization-of-in-d9eb2fe2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5428%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69eb095d87115cfb68f0d94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6810-cwe-639-authorization-bypass-through-2c779cfe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6810%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codepeople%20Booking%20Calendar%20Contact%20Form&amp;severity=medium&amp;id=69eb095d87115cfb68f0d954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5347-cwe-862-missing-authorization-in-mhm-97b554ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5347%3A%20CWE-862%20Missing%20Authorization%20in%20mhmrajib%20WP%20Books%20Gallery%20%E2%80%93%20Build%20Stunning%20Book%20Showcases%20%26%20Libraries%20in%20Minutes&amp;severity=medium&amp;id=69eb095d87115cfb68f0d938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5364-cwe-434-unrestricted-upload-of-file--d0fb4c0a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5364%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20addonsorg%20Drag%20and%20Drop%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69eb095d87115cfb68f0d940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fast16-mystery-shadowbrokers-reference-reveals-hig-0de02932</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=fast16%20%7C%20Mystery%20ShadowBrokers%20Reference%20Reveals%20High-Precision%20Software%20Sabotage%205%20Years%20Before%20Stuxnet&amp;severity=medium&amp;id=69eb280887115cfb68038e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ai-frame-campaign-continues-bff99c05</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20AI%20Frame%20Campaign%20Continues&amp;severity=medium&amp;id=69eb280887115cfb68038e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6947-cwe-307-improper-restriction-of-exce-ea9fc740</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6947%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20D-Link%20DWM-222W&amp;severity=high&amp;id=69eaec2d87115cfb68c0d956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41324-cwe-400-uncontrolled-resource-consu-35173a6c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41324%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20patrickjuchli%20basic-ftp&amp;severity=high&amp;id=69eaec2d87115cfb68c0d93d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2028-cwe-639-authorization-bypass-through-e72d70be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2028%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ckp267%20MaxiBlocks%20Builder%20%7C%2017%2C000%2B%20Design%20Assets%2C%20Patterns%2C%20Icons%20%26%20Starter%20Sites&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5488-cwe-862-missing-authorization-in-smu-08b9e390</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5488%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6393-cwe-862-missing-authorization-in-wpd-09590bba</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6393%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20%20Knowledge%20Base%20Docs%20%26%20FAQ%20Solution%20for%20Elementor%20%26%20Block%20Editor&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41319-cwe-74-improper-neutralization-of-s-f3044b31</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41319%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20jstedfast%20MailKit&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41318-cwe-79-improper-neutralization-of-i-62fa196f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41318%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41430-cwe-79-improper-neutralization-of-i-7aeea481</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41430%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20press&amp;severity=low&amp;id=69eaec2d87115cfb68c0d940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41317-cwe-352-cross-site-request-forgery--c1bd36c1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41317%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frappe%20press&amp;severity=medium&amp;id=69eada9887115cfb68a5e99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41316-cwe-693-protection-mechanism-failur-2253af9c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41316%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20ruby%20erb&amp;severity=high&amp;id=69eada9887115cfb68a5e99c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33317-cwe-125-out-of-bounds-read-in-op-te-a8bc0973</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33317%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OP-TEE%20optee_os&amp;severity=high&amp;id=69eada9887115cfb68a5e992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33318-cwe-284-improper-access-control-in--33eb08a3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33318%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20actualbudget%20actual&amp;severity=high&amp;id=69eada9887115cfb68a5e998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-friday-april-24th-2026-httpsiscs-cf677b51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Friday%2C%20April%2024th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9906%2C%20(Fri%2C%20Apr%2024th)&amp;severity=medium&amp;id=69ead00c87115cfb689af5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32952-cwe-190-integer-overflow-or-wraparo-7c7a42ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32952%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Azure%20go-ntlmssp&amp;severity=medium&amp;id=69eada9887115cfb68a5e98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41325-cwe-863-incorrect-authorization-in--38c782c3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41325%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20getkirby%20kirby&amp;severity=high&amp;id=69eac1fc87115cfb688c86f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40099-cwe-863-incorrect-authorization-in--18080aa1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40099%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20getkirby%20kirby&amp;severity=medium&amp;id=69eac1fc87115cfb688c86f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34587-cwe-1336-improper-neutralization-of-edccacb4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34587%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20getkirby%20kirby&amp;severity=high&amp;id=69eac1fc87115cfb688c86ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32870-cwe-91-xml-injection-aka-blind-xpat-0712fce2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32870%3A%20CWE-91%3A%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20getkirby%20kirby&amp;severity=medium&amp;id=69eac1fc87115cfb688c86e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31956-cwe-639-authorization-bypass-throug-74ef1c37</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31956%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20xibosignage%20xibo-cms&amp;severity=medium&amp;id=69eac1fc87115cfb688c86e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31955-cwe-918-server-side-request-forgery-f97d366f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31955%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20xibosignage%20xibo-cms&amp;severity=medium&amp;id=69eac1fc87115cfb688c86e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31953-cwe-79-improper-neutralization-of-i-d742715a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31953%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xibosignage%20xibo-cms&amp;severity=medium&amp;id=69eac1fc87115cfb688c86dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25775-cwe-306-missing-authentication-for--773ccfcd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25775%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a187115cfb68850e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31952-cwe-89-improper-neutralization-of-s-adcc797f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31952%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xibosignage%20xibo-cms&amp;severity=high&amp;id=69eab7a187115cfb68850e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35064-cwe-306-missing-authentication-for--7d4c0034</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35064%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SenseLive%20X3050&amp;severity=high&amp;id=69eab7a187115cfb68850e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40620-cwe-306-missing-authentication-for--0af2786c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40620%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a387115cfb68850ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27841-cwe-352-cross-site-request-forgery--72dc62e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27841%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20SenseLive%20X3050&amp;severity=high&amp;id=69eab7a187115cfb68850e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29051-cwe-22-improper-limitation-of-a-pat-31e1dbb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29051%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=69eab7a187115cfb68850e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-25-f8dd5b34</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-25&amp;severity=medium&amp;id=69ecb52c87115cfb68608f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-24-2cf5fd4a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-24&amp;severity=medium&amp;id=69ec056387115cfb68817142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67259-na-4149753f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67259%3A%20n%2Fa&amp;severity=medium&amp;id=69eb9c3d87115cfb684e032b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59308-na-dbc38f63</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59308%3A%20n%2Fa&amp;severity=medium&amp;id=69eb98a187115cfb684afa5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30368-na-de124fcd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30368%3A%20CWE-863%20Incorrect%20Authorization%20in%20Lightspeed%20Lightspeed%20Classroom&amp;severity=medium&amp;id=69eb916f87115cfb68470f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31052-na-504835fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31052%3A%20n%2Fa&amp;severity=medium&amp;id=69eb86f087115cfb6842e45a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31051-na-ef98ba05</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31051%3A%20n%2Fa&amp;severity=low&amp;id=69eb86f087115cfb6842e452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31050-na-65163af5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31050%3A%20n%2Fa&amp;severity=medium&amp;id=69eb86f087115cfb6842e44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61872-na-0f63272c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61872%3A%20n%2Fa&amp;severity=medium&amp;id=69eb86f087115cfb6842e446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42095-cwe-306-missing-authentication-for--c3667dc3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42095%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20KDE%20Arianna&amp;severity=medium&amp;id=69eb7c9b87115cfb683e60a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-24-9aa8fb12</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-24&amp;severity=low&amp;id=69eb0bc787115cfb68f2dff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40623-cwe-862-missing-authorization-in-se-3624bc83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40623%3A%20CWE-862%20Missing%20Authorization%20in%20SenseLive%20X3050&amp;severity=high&amp;id=69eab7a387115cfb68850ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29050-cwe-22-improper-limitation-of-a-pat-b3665099</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29050%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=69eab7a187115cfb68850e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40431-cwe-319-cleartext-transmission-of-s-9862a146</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40431%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20SenseLive%20X3050&amp;severity=medium&amp;id=69eab7a187115cfb68850e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27843-cwe-306-missing-authentication-for--e4fcb515</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27843%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a187115cfb68850e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39462-cwe-522-insufficiently-protected-cr-cedf02e1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39462%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a187115cfb68850e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35503-cwe-798-use-of-hard-coded-credentia-feae2abb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35503%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a187115cfb68850e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25720-cwe-613-insufficient-session-expira-e2b83cfa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25720%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20SenseLive%20X3050&amp;severity=medium&amp;id=69eab07687115cfb687ad29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40630-cwe-288-authentication-bypass-using-b2eedf7d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40630%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab07687115cfb687ad2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1789-cwe-807-reliance-on-untrusted-inputs-39295111</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1789%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Canon%20Inc.%20imagePRESS%20Series&amp;severity=medium&amp;id=69eab07687115cfb687ad296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6732-access-of-resource-using-incompatibl-db1e901f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6732%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69ea9ed487115cfb686fffd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2708-inconsistent-interpretation-of-http--7b266904</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2708%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69ea97db87115cfb68681ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32172-cwe-427-uncontrolled-search-path-el-088a79ce</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32172%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Microsoft%20Power%20Apps&amp;severity=high&amp;id=69ea97db87115cfb68681bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35431-cwe-918-server-side-request-forgery-ecd1dd29</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35431%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=69ea97db87115cfb68681bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24303-cwe-284-improper-access-control-in--460583b0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24303%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Partner%20Center&amp;severity=critical&amp;id=69ea97db87115cfb68681ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26150-cwe-918-server-side-request-forgery-affb6348</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26150%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview%20eDiscovery&amp;severity=high&amp;id=69ea97db87115cfb68681ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33819-cwe-502-deserialization-of-untruste-a7ea77f6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33819%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Bing&amp;severity=critical&amp;id=69ea97db87115cfb68681bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33102-cwe-601-url-redirection-to-untruste-cf8cfee5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33102%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&amp;severity=critical&amp;id=69ea97db87115cfb68681bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32210-cwe-918-server-side-request-forgery-92bdf4e9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32210%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(online)&amp;severity=critical&amp;id=69ea97db87115cfb68681bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26210-cwe-502-deserialization-of-untruste-0013131b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26210%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20kvcache-ai%20ktransformers&amp;severity=critical&amp;id=69ea90c487115cfb6861c6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41274-cwe-943-improper-neutralization-of--1fbbff2e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41274%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69ea90c487115cfb6861c6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28525-cwe-191-integer-underflow-wrap-or-w-1c86680c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28525%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20sbabic%20swupdate&amp;severity=high&amp;id=69ea8d5f87115cfb685fc9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6942-improper-neutralization-of-special-e-6e1a54b9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6942%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20radareorg%20radare2&amp;severity=critical&amp;id=69ea8d5f87115cfb685fc9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6941-cwe-59-improper-link-resolution-befo-54c7eb3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6941%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20radareorg%20radare2&amp;severity=medium&amp;id=69ea89bd87115cfb685d0b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6940-cwe-22-improper-limitation-of-a-path-fafc07b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6940%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20radareorg%20radare2&amp;severity=medium&amp;id=69ea89bd87115cfb685d0b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6376-cwe-306-missing-authentication-for-c-a38350f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6376%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SpiceJet%20Online%20Booking%20System&amp;severity=high&amp;id=69ea89bd87115cfb685d0b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6375-cwe-639-authorization-bypass-through-bb68022b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6375%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20SpiceJet%20Online%20Booking%20System&amp;severity=high&amp;id=69ea89bd87115cfb685d0b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41264-cwe-184-incomplete-list-of-disallow-7f177023</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41264%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69ea9e7887115cfb686fc345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41265-cwe-77-improper-neutralization-of-s-19dd647d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41265%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69ea89bd87115cfb685d0b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41279-cwe-639-authorization-bypass-throug-34d1bb3b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41279%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea89bd87115cfb685d0b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41278-cwe-200-exposure-of-sensitive-infor-bd64edda</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41278%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea9e7887115cfb686fc398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41276-cwe-287-improper-authentication-in--13083407</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41276%3A%20CWE-287%3A%20Improper%20Authentication%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea9e7887115cfb686fc367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41277-cwe-284-improper-access-control-in--9470e14c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41277%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea9e7887115cfb686fc38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25874-cwe-502-deserialization-of-untruste-df0e19a1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25874%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20LeRobot&amp;severity=critical&amp;id=69ea8d5f87115cfb685fc9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41275-cwe-319-cleartext-transmission-of-s-3b8e81f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41275%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782a87115cfb6850f85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41273-cwe-306-missing-authentication-for--ee0237e2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41273%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crypto-drainers-as-a-converging-threat-insights-in-b6f47dca</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crypto%20Drainers%20as%20a%20Converging%20Threat%3A%20Insights%20into%20Emerging%20Hybrid%20Attack%20Ecosystems&amp;severity=medium&amp;id=69eb2ef987115cfb680962cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snow-flurries-how-unc6692-employed-social-engineer-b41b1549</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Snow%20Flurries%3A%20How%20UNC6692%20Employed%20Social%20Engineering%20to%20Deploy%20a%20Custom%20Malware%20Suite&amp;severity=medium&amp;id=69eb327b87115cfb680bf745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hold-the-phone-international-revenue-share-fraud-d-def3a767</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hold%20the%20Phone!%20International%20Revenue%20Share%20Fraud%20Driven%20by%20Fake%20CAPTCHAs&amp;severity=medium&amp;id=69eb2b7387115cfb6806c5fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41271-cwe-918-server-side-request-forgery-0022e04f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41271%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41272-cwe-918-server-side-request-forgery-2890a669</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41272%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41270-cwe-284-improper-access-control-in--5c95242a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41270%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41269-cwe-434-unrestricted-upload-of-file-420ecc51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41269%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41268-cwe-20-improper-input-validation-in-20ba4b4c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41268%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f82a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41267-cwe-639-authorization-bypass-throug-48d20453</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41267%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41266-cwe-200-exposure-of-sensitive-infor-547a4968</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41266%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41137-cwe-94-improper-control-of-generati-e79779d5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41137%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69ea782987115cfb6850f81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41138-cwe-94-improper-control-of-generati-6fce0c16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41138%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41205-cwe-22-improper-limitation-of-a-pat-754f5f32</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41205%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sqlalchemy%20mako&amp;severity=high&amp;id=69ea89bd87115cfb685d0b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41247-cwe-78-improper-neutralization-of-s-a542372d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41247%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Studio-42%20elFinder&amp;severity=high&amp;id=69ea9e7887115cfb686fc3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41246-cwe-94-improper-control-of-generati-992ab429</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41246%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20projectcontour%20contour&amp;severity=high&amp;id=69ea9e7887115cfb686fc39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41213-cwe-307-improper-restriction-of-exc-098ec1dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41213%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20node-oauth%20node-oauth2-server&amp;severity=medium&amp;id=69ea6a1b87115cfb68455bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41173-cwe-770-allocation-of-resources-wit-c7d0046f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41173%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-telemetry%20opentelemetry-dotnet-contrib&amp;severity=medium&amp;id=69ea6a1b87115cfb68455bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6074-cwe-35-path-traversal-in-intrado-911-771091bc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6074%3A%20CWE-35%20Path%20traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Intrado%20911%20Emergency%20Gateway&amp;severity=critical&amp;id=69ea6a1b87115cfb68455bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40886-cwe-129-improper-validation-of-arra-e4b6aa6a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40886%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=69ea6a1a87115cfb68455b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33694-cwe-59-improper-link-resolution-bef-dff081f9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33694%3A%20CWE-59%20Improper%20link%20resolution%20before%20file%20access%20(&apos;link%20following&apos;)%20in%20Tenable%2C%20Inc.%20Tenable%20Nessus%2C%20Tenable%20Nessus%20Agent&amp;severity=high&amp;id=69ea6a1a87115cfb68455b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41078-cwe-770-allocation-of-resources-wit-6ec21a19</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41078%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-telemetry%20opentelemetry-dotnet&amp;severity=medium&amp;id=69ea6a1b87115cfb68455be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40894-cwe-789-memory-allocation-with-exce-72b1ace5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40894%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-dotnet&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40891-cwe-789-memory-allocation-with-exce-ea6273cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40891%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-dotnet&amp;severity=medium&amp;id=69ea5fae87115cfb683e85c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40182-cwe-789-memory-allocation-with-exce-ee3f9d35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40182%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-dotnet&amp;severity=medium&amp;id=69ea5fae87115cfb683e85c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6921-race-in-google-chrome-828e0fe2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6921%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=69ea5c0887115cfb683ce452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6920-out-of-bounds-read-in-google-chrome-d0bf5523</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6920%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=critical&amp;id=69ea5c0887115cfb683ce44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6919-use-after-free-in-google-chrome-07f5509c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6919%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69ea9e7887115cfb686fc3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5039-cwe-1394-use-of-default-cryptographi-93bf2c5f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5039%3A%20CWE-1394%20Use%20of%20default%20cryptographic%20key%20in%20TP-Link%20Systems%20Inc.%20TL-WL841N%20v13&amp;severity=medium&amp;id=69ea5fae87115cfb683e85cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-and-phishing-targeting-taxpayers-kaspersky-of-21018b0d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%20and%20phishing%20targeting%20taxpayers%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ea437387115cfb682da704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudsmith-raises-72-million-in-series-c-funding-596b797b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudsmith%20Raises%20%2472%20Million%20in%20Series%20C%20Funding&amp;severity=medium&amp;id=69ea355c87115cfb682493de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40472-cwe-79-improper-neutralization-of-i-2ecaa282</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40472%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)&amp;severity=critical&amp;id=69ea9e7887115cfb686fc410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40471-cwe-352-cross-site-request-forgery--4ca0bc45</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40471%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)&amp;severity=critical&amp;id=69ea9e7887115cfb686fc40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41240-cwe-183-permissive-list-of-allowed--b335c129</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41240%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69ea588387115cfb683b9248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34003-out-of-bounds-read-in-red-hat-red-h-3a485ffc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34003%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69ea588387115cfb683b9244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34001-expired-pointer-dereference-in-red--a6236a0e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34001%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69ea9e7887115cfb686fc3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33999-integer-underflow-wrap-or-wraparoun-ba2406e3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33999%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69ea9e7887115cfb686fc422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40470-cwe-79-improper-neutralization-of-i-7e7b9272</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40470%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)&amp;severity=critical&amp;id=69ea9e7887115cfb686fc40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41239-cwe-79-improper-neutralization-of-i-e42b3ab6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41239%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69ea9e7b87115cfb686fc58b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23751-cwe-306-missing-authentication-for--a63016e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23751%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Tungsten%20Automation%20Kofax%20Capture&amp;severity=critical&amp;id=69ea9e7887115cfb686fc41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41238-cwe-79-improper-neutralization-of-i-2a57f974</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41238%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69ea9e7887115cfb686fc413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62373-cwe-502-deserialization-of-untruste-cd5dc5f9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62373%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pipecat-ai%20pipecat&amp;severity=critical&amp;id=69ea6a1b87115cfb68455bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trigona-affiliates-deploy-custom-exfiltration-tool-38cb885a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trigona%20Affiliates%20Deploy%20Custom%20Exfiltration%20Tool%20to%20Streamline%20Data%20Theft&amp;severity=medium&amp;id=69eb327b87115cfb680bf4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gopherwhisper-a-burrow-full-of-malware-baa9851f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GopherWhisper%3A%20A%20burrow%20full%20of%20malware&amp;severity=medium&amp;id=69eb327b87115cfb680bf510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-a-full-clickfix-attack-chain-part-1-3673b1da</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20a%20Full%20ClickFix%20Attack%20Chain%20-%20Part%201&amp;severity=medium&amp;id=69ea31d787115cfb68230e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dindoor-backdoor-deno-runtime-abuse-and-20-active--23a45870</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DinDoor%20Backdoor%3A%20Deno%20Runtime%20Abuse%20and%2020%20Active%20C2%20Servers&amp;severity=medium&amp;id=69eb361f87115cfb680ef893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35225-cwe-754-improper-check-for-unusual--e5706d3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35225%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20CODESYS%20CODESYS%20EtherNetIP&amp;severity=high&amp;id=69ea9e7887115cfb686fc403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-cybersecurity-firms-ai-hacking-claims-draw-5a7b144a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Cybersecurity%20Firm%E2%80%99s%20AI%20Hacking%20Claims%20Draw%20Comparisons%20to%20Claude%20Mythos&amp;severity=medium&amp;id=69ea15b887115cfb681181fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66286-authorization-bypass-through-user-c-c82237e2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66286%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69ea15c187115cfb68118427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39440-cwe-94-improper-control-of-generati-fce0c635</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39440%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Funnelforms%20LLC%20FunnelFormsPro&amp;severity=critical&amp;id=69ea15c187115cfb6811842c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rilian-raises-175-million-for-ai-native-security-o-1c48bbcf</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rilian%20Raises%20%2417.5%20Million%20for%20AI-Native%20Security%20Orchestration&amp;severity=medium&amp;id=69ea07a887115cfb680b704e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-behavioral-shift-why-trusted-relationships-are-7a6e9a99</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Behavioral%20Shift%3A%20Why%20Trusted%20Relationships%20Are%20the%20Newest%20Attack%20Surface&amp;severity=low&amp;id=69ea011d87115cfb6807e86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62110-cwe-79-improper-neutralization-of-i-59aa3e13</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62110%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rescue%20Themes%20Rescue%20Shortcodes&amp;severity=medium&amp;id=69ea016587115cfb68083e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/luxury-cosmetics-giant-rituals-discloses-data-brea-b2ccbdf1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Luxury%20Cosmetics%20Giant%20Rituals%20Discloses%20Data%20Breach&amp;severity=medium&amp;id=69e9fd1c87115cfb68054a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62104-cwe-862-missing-authorization-in-na-01158fea</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62104%3A%20CWE-862%20Missing%20Authorization%20in%20Navneil%20Naicker%20ACF%20Galerie%204&amp;severity=medium&amp;id=69ea016587115cfb68083e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28040-cwe-79-improper-neutralization-of-i-691c7a4c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28040%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Magepeople%20inc.%20Taxi%20Booking%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=69ea016587115cfb68083e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-exploited-notification-flaw-thu-apr--f24425d5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Exploited%20Notification%20Flaw%2C%20(Thu%2C%20Apr%2023rd)&amp;severity=medium&amp;id=69e9f30987115cfb68fefd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-can-autonomously-hack-cloud-systems-with-minima-16006173</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Can%20Autonomously%20Hack%20Cloud%20Systems%20With%20Minimal%20Oversight%3A%20Researchers&amp;severity=medium&amp;id=69e9f30487115cfb68fef74f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6903-cwe-22-improper-limitation-of-a-path-74e74900</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6903%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zurich%20Instruments%20LabOne&amp;severity=high&amp;id=69e9eb8887115cfb68f9fc5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6887-cwe-89-improper-neutralization-of-sp-f0a62364</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6887%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20BorG%20Technology%20Corporation%20Borg%20SPM%202007&amp;severity=critical&amp;id=69e9eb8887115cfb68f9fc59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6886-cwe-1390-weak-authentication-in-borg-2caa495c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6886%3A%20CWE-1390%20Weak%20Authentication%20in%20BorG%20Technology%20Corporation%20Borg%20SPM%202007&amp;severity=critical&amp;id=69e9eb8887115cfb68f9fc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6885-cwe-434-unrestricted-upload-of-file--bea8ee1a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6885%3A%20CWE-434%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20BorG%20Technology%20Corporation%20Borg%20SPM%202007&amp;severity=critical&amp;id=69e9eb8887115cfb68f9fc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/foxit-impersonation-fake-pdf-installer-deploys-vnc-8622a185</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Foxit%20Impersonation%3A%20Fake%20PDF%20Installer%20Deploys%20VNC&amp;severity=medium&amp;id=69ea2aee87115cfb681ee463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indirect-prompt-injection-in-the-wild-10-ipi-paylo-b1d36285</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indirect%20Prompt%20Injection%20in%20the%20Wild%3A%2010%20IPI%20Payloads%20Found&amp;severity=medium&amp;id=69ea2aee87115cfb681ee470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-ios-flaw-allowing-recovery-of-delete-fcb8e108</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20iOS%20Flaw%20Allowing%20Recovery%20of%20Deleted%20Chats&amp;severity=low&amp;id=69e9dd7a87115cfb68e747d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3960-cwe-94-improper-control-of-generatio-98800b0e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3960%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=medium&amp;id=69e9eb8887115cfb68f9fc46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3259-cwe-209-generation-of-error-message--1455facc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3259%3A%20CWE-209%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20Google%20Cloud%20BigQuery&amp;severity=high&amp;id=69e9eb8887115cfb68f9fc43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-campaign-deploying-adaptixc2-beacon-and--ce02325b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Campaign%20Deploying%20AdaptixC2%20Beacon%20and%20VS%20Code%20via%20Trojanized%20SumatraPDF&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5464-cwe-862-missing-authorization-in-smu-3d3ceddb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5464%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=high&amp;id=69e9eb8887115cfb68f9fc4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-attack-via-adobe-themed-lure-delivering-s-6024f2b6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Attack%20via%20Adobe-Themed%20Lure%20Delivering%20ScreenConnect%20and%20Credential%20Harvesting%20Tools&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-microsoft-defender-vulnerability-exploited--49a0cdc5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Microsoft%20Defender%20Vulnerability%20Exploited%20as%20Zero-Day&amp;severity=low&amp;id=69e9d2ec87115cfb68d325e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41564-cwe-335-incorrect-usage-of-seeds-in-0949d2a5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41564%3A%20CWE-335%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20MIK%20CryptX&amp;severity=high&amp;id=69e9cfd487115cfb68ce4194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41040-inefficient-regular-expression-comp-1476ba25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41040%3A%20Inefficient%20regular%20expression%20complexity%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=high&amp;id=69e9c86d87115cfb68c533f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10549-cwe-427-uncontrolled-search-path-el-e8e67463</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10549%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20EfficientLab%2C%20LLC%20Controlio&amp;severity=medium&amp;id=69e9c86d87115cfb68c533f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34488-uncontrolled-search-path-element-in-9431a581</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34488%3A%20Uncontrolled%20Search%20Path%20Element%20in%20i-PRO%20Co.%2C%20Ltd.%20IP%20Setting%20Software&amp;severity=high&amp;id=69e9bdd387115cfb68b66bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4512-cwe-79-cross-site-scripting-xss-in-r-bdf28973</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4512%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20reCaptcha%20by%20WebDesignBy&amp;severity=low&amp;id=69e9bdd387115cfb68b66c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4106-cwe-200-information-exposure-in-ht-m-c5eea5ac</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4106%3A%20CWE-200%20Information%20Exposure%20in%20HT%20Mega%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69e9bdd387115cfb68b66c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41990-cwe-787-out-of-bounds-write-in-gnup-648d4b9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41990%3A%20CWE-787%20Out-of-bounds%20Write%20in%20gnupg%20Libgcrypt&amp;severity=medium&amp;id=69e9a8be87115cfb68a60134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41989-cwe-787-out-of-bounds-write-in-gnup-9e7a9f02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41989%3A%20CWE-787%20Out-of-bounds%20Write%20in%20gnupg%20Libgcrypt&amp;severity=medium&amp;id=69e9a8be87115cfb68a6012f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40529-improper-neutralization-of-special--f25db596</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40529%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20KANATA%20Limited%20CMS%20ALAYA&amp;severity=medium&amp;id=69e9a8be87115cfb68a60128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41988-cwe-670-always-incorrect-control-fl-19277837</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41988%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20uuidjs%20uuid&amp;severity=low&amp;id=69e9a8be87115cfb68a6012b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-dprk-cyber-threat-actors-fake-it-worker--485f6111</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20DPRK%20Cyber%20Threat%20Actors%3A%20Fake%20IT%20Worker%20Infrastructure&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-powershell-analyzing-the-multi-action-click-c8f4b2c0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20PowerShell%3A%20Analyzing%20the%20Multi-Action%20ClickFix%20Variant&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3361-cwe-79-improper-neutralization-of-in-78924b0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3361%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tijmensmit%20WP%20Store%20Locator&amp;severity=medium&amp;id=69e99ab387115cfb687fff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3007-vulnerability-in-three-learning-kool-639937d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3007%3A%20Vulnerability%20in%20Three%20Learning%20Koollab%20Learning%20Management%20System&amp;severity=medium&amp;id=69e99ab387115cfb687fff96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3844-cwe-434-unrestricted-upload-of-file--8e6074b3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3844%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20cloudways%20Breeze%20Cache&amp;severity=critical&amp;id=69e9891887115cfb6867f663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2951-cwe-79-improper-neutralization-of-in-1a078f97</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2951%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gutentor%20Gutentor%20%E2%80%93%20Gutenberg%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=69e9891887115cfb6867f65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-23rd-2026-httpsis-c187c921</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%2023rd%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9904%2C%20(Thu%2C%20Apr%2023rd)&amp;severity=medium&amp;id=69e97e8c87115cfb685dbae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1923-cwe-79-improper-neutralization-of-in-5423a21a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1923%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20socialrocket%20Social%20Rocket%20%E2%80%93%20Social%20Sharing%20Plugin&amp;severity=medium&amp;id=69e97b6f87115cfb685bd761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41211-cwe-22-improper-limitation-of-a-pat-88fc9487</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41211%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20voidzero-dev%20vite-plus&amp;severity=high&amp;id=69e9707c87115cfb68522147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41679-cwe-287-improper-authentication-in--09e9d7e4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41679%3A%20CWE-287%3A%20Improper%20Authentication%20in%20paperclipai%20paperclip&amp;severity=critical&amp;id=69e9707c87115cfb6852214e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41208-cwe-78-improper-neutralization-of-s-850f967b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20paperclipai%20%40paperclipai%2Fserver&amp;severity=high&amp;id=69e9707c87115cfb68522144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41206-cwe-184-incomplete-list-of-disallow-d1a9d658</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41206%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20ParzivalHack%20PySpector&amp;severity=medium&amp;id=69e9707c87115cfb6852213f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41200-cwe-79-improper-neutralization-of-i-9cafd22a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41200%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NUWCDIVNPT%20stig-manager&amp;severity=high&amp;id=69e9707c87115cfb6852213c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41197-cwe-131-incorrect-calculation-of-bu-282b810c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41197%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20noir-lang%20noir&amp;severity=critical&amp;id=69e9707c87115cfb68522138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41196-cwe-94-improper-control-of-generati-70ec6155</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41196%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20luanti-org%20luanti&amp;severity=critical&amp;id=69e9707c87115cfb68522134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41182-cwe-200-exposure-of-sensitive-infor-8e8ca26e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41182%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20langchain-ai%20langsmith-sdk&amp;severity=medium&amp;id=69e9707c87115cfb68522131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41180-cwe-22-improper-limitation-of-a-pat-1ff3f9c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41180%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20psi-4ward%20psitransfer&amp;severity=high&amp;id=69e9707c87115cfb6852212c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41243-cwe-284-improper-access-control-in--17f3e53b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41243%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20siemvk%20OpenLearn&amp;severity=medium&amp;id=69e9707c87115cfb6852214a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32679-uncontrolled-search-path-element-in-3ff2da85</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32679%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Japan%20Media%20Systems%20Corporation%20Downloader5Installer.exe&amp;severity=high&amp;id=69ea9e7887115cfb686fc3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40062-improper-limitation-of-a-pathname-t-d9e7ba4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40062%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Ziosoft%2C%20Inc.%20Ziostation2&amp;severity=high&amp;id=69ea9e7887115cfb686fc407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6878-sandbox-issue-in-bytedance-verl-81afb8d9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6878%3A%20Sandbox%20Issue%20in%20ByteDance%20verl&amp;severity=medium&amp;id=69ea193c87115cfb681377a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-24-3e3ffd10</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-24&amp;severity=medium&amp;id=69ec2f0987115cfb68b8523d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-23-632826cc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-23&amp;severity=medium&amp;id=69eab3e387115cfb687c711c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50229-na-b00595ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50229%3A%20n%2Fa&amp;severity=critical&amp;id=69ea9e7887115cfb686fc417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70994-na-cca94a75</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70994%3A%20n%2Fa&amp;severity=high&amp;id=69ea9e7887115cfb686fc3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39087-na-befb301f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39087%3A%20n%2Fa&amp;severity=critical&amp;id=69ea9e7887115cfb686fc3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31173-na-2cc52968</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31173%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31169-na-f962979a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31169%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31168-na-9bef328b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31168%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31167-na-058ab7be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31167%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31166-na-8c86bc42</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31166%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31163-na-eaeeee31</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31163%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31162-na-30f58b88</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31162%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31179-na-1e3eff11</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31179%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5fae87115cfb683e85cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31175-na-8558c681</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31175%3A%20n%2Fa&amp;severity=critical&amp;id=69ea5fae87115cfb683e85be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31174-na-61de1c87</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31174%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5fae87115cfb683e85bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31172-na-7aa971f4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31172%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5fae87115cfb683e85b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31171-na-eae63db6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31171%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5fae87115cfb683e85b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31165-na-daa1c506</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31165%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5c0887115cfb683ce44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31164-na-6ccadb5d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31164%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5c0887115cfb683ce448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31160-na-e95be85a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31160%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5c0887115cfb683ce445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31181-na-e16bbcb2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31181%3A%20n%2Fa&amp;severity=critical&amp;id=69ea588387115cfb683b9241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31178-na-1cc71843</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31178%3A%20n%2Fa&amp;severity=critical&amp;id=69ea588387115cfb683b923e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31177-na-b0ff6662</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31177%3A%20n%2Fa&amp;severity=critical&amp;id=69ea588387115cfb683b923b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31176-na-d8307adf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31176%3A%20n%2Fa&amp;severity=medium&amp;id=69ea588387115cfb683b9238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31159-na-c6ec11f7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31159%3A%20n%2Fa&amp;severity=medium&amp;id=69ea588387115cfb683b9235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-23-c3f3ed20</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-23&amp;severity=low&amp;id=69e9eb7f87115cfb68f9c85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1726-cwe-269-improper-privilege-managemen-dff16851</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1726%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IBM%20Guardium%20Key%20Lifecycle%20Manager&amp;severity=medium&amp;id=69e95f0887115cfb6814189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36074-cwe-434-unrestricted-upload-of-file-ebdda370</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36074%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20Security%20Verify%20Directory%20(Container)&amp;severity=medium&amp;id=69e95f0887115cfb68141890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5926-vulnerability-in-ibm-verify-identity-b2fee278</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5926%3A%20Vulnerability%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69e95f0887115cfb681418a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1352-cwe-1284-improper-validation-of-spec-bff0e4b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1352%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2&amp;severity=medium&amp;id=69e95f0887115cfb68141899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1272-cwe-613-insufficient-session-expirat-ef765271</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1272%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=low&amp;id=69e95f0887115cfb68141893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1274-cwe-840-business-logic-errors-in-ibm-001fd6e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1274%3A%20CWE-840%20Business%20Logic%20Errors%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=69e95f0887115cfb68141896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6874-reliance-on-reverse-dns-resolution-i-b780d4cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6874%3A%20Reliance%20on%20Reverse%20DNS%20Resolution%20in%20ericc-ch%20copilot-api&amp;severity=medium&amp;id=69e95f0987115cfb681418a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5935-cwe-78-improper-neutralization-of-sp-2a79deef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5935%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Total%20Storage%20Service%20Console%20(TSSC)%20%2F%20TS4500%20IMC&amp;severity=high&amp;id=69e95f0987115cfb681418a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4917-cwe-22-improper-limitation-of-a-path-4277155a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4917%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=69e95f0887115cfb6814189f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4918-cwe-79-improper-neutralization-of-in-5d4bd3b4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4918%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=69e95b6487115cfb68ea1883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4919-cwe-79-improper-neutralization-of-in-cb0da51f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4919%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=69e95b6487115cfb68ea1886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3621-cwe-269-improper-privilege-managemen-c403a841</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3621%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=high&amp;id=69e95b6487115cfb68ea1880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-artifacts-found-in-official-kics-docker--8683cb6b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Artifacts%20Found%20in%20Official%20KICS%20Docker%20Repository%20and%20Code%20Extensions&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild-16aa45</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Untangling%20a%20Linux%20Incident%20With%20an%20OpenAI%20Twist%20(Part%202)&amp;severity=medium&amp;id=682c992c7960f6956616aa45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40517-cwe-78-improper-neutralization-of-s-e9c54683</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40517%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radareorg%20radare2&amp;severity=high&amp;id=69e9490f19fe3cd2cdf886c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41175-cwe-470-use-of-externally-controlle-757022e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41175%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69e9419f19fe3cd2cdf48808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41314-cwe-789-memory-allocation-with-exce-dd9018a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41314%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e93e1919fe3cd2cdf2afe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41313-cwe-834-excessive-iteration-in-py-p-6924f313</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41313%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e93e1919fe3cd2cdf2afdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41312-cwe-789-memory-allocation-with-exce-2df18452</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41312%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e93e1919fe3cd2cdf2afd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41168-cwe-834-excessive-iteration-in-py-p-7c5b58c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41168%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e9371d19fe3cd2cdefb1f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41167-cwe-89-improper-neutralization-of-s-51b08aed</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41167%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CyferShepard%20Jellystat&amp;severity=critical&amp;id=69e9371d19fe3cd2cdefb1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41134-cwe-94-improper-control-of-generati-e0092852</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41134%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20microsoft%20kiota&amp;severity=high&amp;id=69e9338e19fe3cd2cdedf9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34068-cwe-347-improper-verification-of-cr-faf5604c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34068%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20nimiq%20nimiq-transaction&amp;severity=medium&amp;id=69e92c8e19fe3cd2cdeac9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34067-cwe-617-reachable-assertion-in-nimi-d41d9655</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34067%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20nimiq%20nimiq-transaction&amp;severity=low&amp;id=69e92c8e19fe3cd2cdeac9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34066-cwe-20-improper-input-validation-in-1a32bdac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34066%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nimiq%20nimiq-blockchain&amp;severity=medium&amp;id=69e9290319fe3cd2cde955ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34065-cwe-252-unchecked-return-value-in-n-b2c2f3d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34065%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20nimiq%20nimiq-primitives&amp;severity=high&amp;id=69e9290319fe3cd2cde955a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34064-cwe-191-integer-underflow-wrap-or-w-a4237264</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34064%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20nimiq%20nimiq-account&amp;severity=medium&amp;id=69e9290319fe3cd2cde9559f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34063-cwe-617-reachable-assertion-in-nimi-bc442c35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34063%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20nimiq%20network-libp2p&amp;severity=high&amp;id=69e9290319fe3cd2cde95599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6019-cwe-150-improper-neutralization-of-e-602e438c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6019%3A%20CWE-150%20Improper%20neutralization%20of%20escape%2C%20meta%2C%20or%20control%20sequences%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=69e9290319fe3cd2cde955b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34062-cwe-770-allocation-of-resources-wit-1356ecd8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34062%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nimiq%20network-libp2p&amp;severity=medium&amp;id=69e9290319fe3cd2cde95594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33471-cwe-20-improper-input-validation-in-2bd8708b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33471%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nimiq%20nimiq-block&amp;severity=critical&amp;id=69e921fb19fe3cd2cde59f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34413-cwe-497-exposure-of-sensitive-syste-4b21189a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34413%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20thexerteproject%20xerteonlinetoolkits&amp;severity=high&amp;id=69e91af419fe3cd2cde2a8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34415-cwe-184-incomplete-list-of-disallow-f774ae94</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34415%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20thexerteproject%20xerteonlinetoolkits&amp;severity=critical&amp;id=69e91af419fe3cd2cde2a8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34414-cwe-22-improper-limitation-of-a-pat-0a7e813a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34414%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thexerteproject%20xerteonlinetoolkits&amp;severity=high&amp;id=69e91af419fe3cd2cde2a8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41459-cwe-497-exposure-of-sensitive-syste-2d4a5aa9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41459%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20thexerteproject%20xerteonlinetoolkits&amp;severity=medium&amp;id=69e91af419fe3cd2cde2a8c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28950-notifications-marked-for-deletion-c-2c06203a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28950%3A%20Notifications%20marked%20for%20deletion%20could%20be%20unexpectedly%20retained%20on%20the%20device%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69e913ed19fe3cd2cddf58dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26354-cwe-121-stack-based-buffer-overflow-0d554218</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26354%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e913ed19fe3cd2cddf58d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41468-cwe-1104-use-of-unmaintained-third--1563ff90</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41468%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third-Party%20Components%20in%20Beghelli%20SicuroWeb%20(Sicuro24)&amp;severity=critical&amp;id=69e913ed19fe3cd2cddf58e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41469-cwe-693-protection-mechanism-failur-ac18e619</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41469%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20Beghelli%20SicuroWeb%20(Sicuro24)&amp;severity=medium&amp;id=69e913ed19fe3cd2cddf58e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-packages-hit-with-teampcp-style-canisterworm-m-7d4ed757</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%20Packages%20Hit%20with%20TeamPCP-Style%20CanisterWorm%20Malware&amp;severity=medium&amp;id=69e9e47e87115cfb68f3d15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targeting-developers-real-world-cases-tactics-and--0de05a7b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targeting%20developers%3A%20real-world%20cases%2C%20tactics%2C%20and%20defense%20strategies%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69e8f46c19fe3cd2cdced25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35381-cwe-684-incorrect-provision-of-spec-02f007c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35381%3A%20CWE-684%3A%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d719fe3cd2cdd02535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35380-cwe-20-improper-input-validation-in-0c5404b6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35380%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d719fe3cd2cdd02531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35379-cwe-684-incorrect-provision-of-spec-ae05b54f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35379%3A%20CWE-684%3A%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d719fe3cd2cdd0252d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35378-cwe-768-incorrect-short-circuit-eva-51d9a39d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35378%3A%20CWE-768%3A%20Incorrect%20Short%20Circuit%20Evaluation%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d719fe3cd2cdd02529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35377-cwe-20-improper-input-validation-in-94960f0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35377%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d519fe3cd2cdd00d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35376-cwe-367-time-of-check-time-of-use-t-2aa7d04d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35376%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35375-cwe-176-improper-handling-of-unicod-af2daa2a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35375%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d519fe3cd2cdd00d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35374-cwe-367-time-of-check-time-of-use-t-3ad00346</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35374%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35373-cwe-176-improper-handling-of-unicod-47ec4bf4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35373%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d519fe3cd2cdd00d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35372-cwe-61-unix-symbolic-link-symlink-f-6b0f898e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35372%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35371-cwe-451-user-interface-ui-misrepres-c8dbd129</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35371%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d519fe3cd2cdd00d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35370-cwe-863-incorrect-authorization-in--17f882aa</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35370%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35369-cwe-20-improper-input-validation-in-f4e500ea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35369%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35368-cwe-426-untrusted-search-path-in-uu-fc8d78ad</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35368%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Uutils%20coreutils&amp;severity=high&amp;id=69e8f7d519fe3cd2cdd00d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35367-cwe-732-incorrect-permission-assign-5bf25456</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35367%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d319fe3cd2cdd00d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35366-cwe-754-improper-check-for-unusual--f944d272</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35366%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35365-cwe-59-improper-link-resolution-bef-3ccb2f69</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35365%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35364-cwe-367-time-of-check-time-of-use-t-a7877f35</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35364%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35363-cwe-22-improper-limitation-of-a-pat-f3d92ffe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35363%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35362-cwe-367-time-of-check-time-of-use-t-8d6557dc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35362%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d319fe3cd2cdd00cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35361-cwe-281-improper-preservation-of-pe-f6d833a4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35361%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d319fe3cd2cdd00cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35360-cwe-367-time-of-check-time-of-use-t-347ec03e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35360%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35359-cwe-367-time-of-check-time-of-use-t-f2d68315</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35359%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35358-cwe-706-use-of-incorrectly-resolved-806512e0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35358%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35357-cwe-367-time-of-check-time-of-use-t-8a74a812</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35357%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35356-cwe-367-time-of-check-time-of-use-t-161d31ee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35356%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35355-cwe-367-time-of-check-time-of-use-t-f30b6900</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35355%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35354-cwe-367-time-of-check-time-of-use-t-41b623b0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35354%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35353-cwe-367-time-of-check-time-of-use-t-ee198c91</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35353%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d019fe3cd2cdd00c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35352-cwe-367-time-of-check-time-of-use-t-47bf3c3f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35352%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=high&amp;id=69e8f7d019fe3cd2cdd00c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35351-cwe-281-improper-preservation-of-pe-0431ef0b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35351%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35350-cwe-281-improper-preservation-of-pe-ee6908b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35350%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35349-cwe-59-improper-link-resolution-bef-2dbf7ea9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35349%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35348-cwe-248-uncaught-exception-in-uutil-d7ee53a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35348%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35347-cwe-20-improper-input-validation-in-49c9e047</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35347%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7ce19fe3cd2cdd00c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35346-cwe-176-improper-handling-of-unicod-6258c245</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35346%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7ce19fe3cd2cdd00c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35345-cwe-367-time-of-check-time-of-use-t-cfd4056b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35345%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7ce19fe3cd2cdd00c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35344-cwe-252-unchecked-return-value-in-u-04cf1750</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35344%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7ce19fe3cd2cdd00c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35343-cwe-670-always-incorrect-control-fl-12e9acb5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35343%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7ce19fe3cd2cdd00c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35342-cwe-377-insecure-temporary-file-in--873d258b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35342%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7ce19fe3cd2cdd00c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35341-cwe-732-incorrect-permission-assign-f0bd459e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35341%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Uutils%20coreutils&amp;severity=high&amp;id=69e8f7ce19fe3cd2cdd00c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35340-cwe-253-incorrect-check-of-function-640b29cb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35340%3A%20CWE-253%3A%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7ce19fe3cd2cdd00c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35339-cwe-253-incorrect-check-of-function-dd2f7a2e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35339%3A%20CWE-253%3A%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7ce19fe3cd2cdd00c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35338-cwe-22-improper-limitation-of-a-pat-0f5ba1fa</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35338%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Uutils%20coreutils&amp;severity=high&amp;id=69e8f7ce19fe3cd2cdd00bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58922-cwe-352-cross-site-request-forgery--9fb81152</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58922%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeFusion%20Avada&amp;severity=medium&amp;id=69e8f0d819fe3cd2cdcd58b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58344-improper-neutralization-of-input-du-c6bafb31</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58344%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2094Cb%20Carbon%20Forum&amp;severity=medium&amp;id=69e8e9bb19fe3cd2cdc88f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/after-bluesky-mastodon-targeted-in-ddos-attack-756f23ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=After%20Bluesky%2C%20Mastodon%20Targeted%20in%20DDoS%20Attack&amp;severity=medium&amp;id=69e8dbaa19fe3cd2cdbeb7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33611-integer-overflow-or-wraparound-in-p-3870a7e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33611%3A%20Integer%20Overflow%20or%20Wraparound%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdacaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33610-uncontrolled-resource-consumption-i-013089b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33610%3A%20Uncontrolled%20Resource%20Consumption%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdaca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33609-improper-neutralization-of-special--ba687410</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33609%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdaca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33608-improper-control-of-generation-of-c-947cf7dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33608%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PowerDNS%20Authoritative&amp;severity=high&amp;id=69e8d83619fe3cd2cdbdaca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33593-divide-by-zero-in-powerdns-dnsdist-524fafa6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33593%3A%20Divide%20By%20Zero%20in%20PowerDNS%20DNSdist&amp;severity=high&amp;id=69e8d83319fe3cd2cdbdac07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33594-allocation-of-resources-without-lim-bbf529a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33594%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33595-allocation-of-resources-without-lim-e15366a7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33595%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33597-improper-encoding-or-escaping-of-ou-1e7009fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33597%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69e8d83319fe3cd2cdbdac13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33596-integer-overflow-or-wraparound-in-p-f4d21ff1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33596%3A%20Integer%20Overflow%20or%20Wraparound%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69e8d83319fe3cd2cdbdac10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33598-out-of-bounds-read-in-powerdns-dnsd-c09eb9ab</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33598%3A%20Out-of-bounds%20Read%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33599-out-of-bounds-read-in-powerdns-dnsd-684d3aa2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33599%3A%20Out-of-bounds%20Read%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69e8d83319fe3cd2cdbdac19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6862-uncontrolled-recursion-in-red-hat-re-8491e1ef</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6862%3A%20Uncontrolled%20Recursion%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdacb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33602-heap-based-buffer-overflow-in-power-8ad725f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33602%3A%20Heap-based%20Buffer%20Overflow%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33254-allocation-of-resources-without-lim-e90b103c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33254%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6861-off-by-one-error-in-red-hat-red-hat--7a4da0f5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6861%3A%20Off-by-one%20Error%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdacad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6859-inclusion-of-functionality-from-untr-6b02868a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6859%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%20AI%20(RHEL%20AI)%203&amp;severity=high&amp;id=69e8d12119fe3cd2cdb88e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0539-cwe-276-incorrect-default-permission-bf1a7aff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0539%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20pcvisit%20pcvisit%20Remote%20Host%20Modul&amp;severity=high&amp;id=69e8d12119fe3cd2cdb88e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/most-serious-cyberattacks-against-the-uk-now-from--1571ea56</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Most%20Serious%20Cyberattacks%20Against%20the%20UK%20Now%20From%20Russia%2C%20Iran%20and%20China%2C%20Cyber%20Chief%20Says&amp;severity=medium&amp;id=69e8c69219fe3cd2cdaeae95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6857-deserialization-of-untrusted-data-in-5f5d291d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6857%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%204%20for%20Quarkus%203&amp;severity=high&amp;id=69e8c6b019fe3cd2cdaed3f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-fudcrypt-a-real-world-malware-crypting--fcd20fed</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20FudCrypt%3A%20A%20Real-World%20Malware%20Crypting%20Service%20Analysis&amp;severity=medium&amp;id=69e8e63519fe3cd2cdc20ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/formbook-malware-uses-phishing-dll-side-loading-ja-e6840a88</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FormBook%20Malware%20Uses%20Phishing%2C%20DLL%20Side-Loading%2C%20JavaScript&amp;severity=medium&amp;id=69e8e9b919fe3cd2cdc882b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/twizadmin-multi-stage-crypto-clipper-infostealer-r-28b2953c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TwizAdmin%20--%20Multi-Stage%20Crypto%20Clipper%2C%20Infostealer%20%26%20Ransomware%20Operation&amp;severity=medium&amp;id=69e8e9b919fe3cd2cdc8829a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kyber-ransomware-double-trouble-windows-and-esxi-a-e5530819</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kyber%20Ransomware%20Double%20Trouble%3A%20Windows%20and%20ESXi%20Attacks%20Explained&amp;severity=medium&amp;id=69e8e9b919fe3cd2cdc88293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6855-improper-limitation-of-a-pathname-to-d100c9c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6855%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%20AI%20(RHEL%20AI)%203&amp;severity=high&amp;id=69e8c30f19fe3cd2cdab6d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wiper-malware-targeted-venezuelan-energy-secto-9d79bd8a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Wiper%20Malware%20Targeted%20Venezuelan%20Energy%20Sector%20Prior%20to%20US%20Intervention&amp;severity=medium&amp;id=69e8bc0619fe3cd2cda4a29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mirai-botnet-targets-flaw-in-discontinued-d-link-r-2d869803</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mirai%20Botnet%20Targets%20Flaw%20in%20Discontinued%20D-Link%20Routers&amp;severity=medium&amp;id=69e8b4fe19fe3cd2cd9de4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-group-expands-toolset-with-new-gogra-linux-bac-b7868bf8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20Group%20Expands%20Toolset%20With%20New%20GoGra%20Linux%20Backdoor&amp;severity=medium&amp;id=69e8e9b919fe3cd2cdc88289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/are-sboms-failing-supply-chain-attacks-rise-as-sec-0385b359</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Are%20SBOMs%20Failing%3F%20Supply%20Chain%20Attacks%20Rise%20as%20Security%20Teams%20Struggle%20With%20SBOM%20Data&amp;severity=medium&amp;id=69e957ed87115cfb68e5707d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-mythos-finds-271-firefox-vulnerabilities-ae74571f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Mythos%20Finds%20271%20Firefox%20Vulnerabilities&amp;severity=medium&amp;id=69e8b17a19fe3cd2cd9b534a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-use-applescript-clickfix-in-f-8ca1fe25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Use%20AppleScript%2C%20ClickFix%20in%20Fresh%20macOS%20Attacks&amp;severity=medium&amp;id=69e8aa7219fe3cd2cd951a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-antigravity-in-crosshairs-of-security-resea-49e17863</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Antigravity%20in%20Crosshairs%20of%20Security%20Researchers%2C%20Cybercriminals&amp;severity=critical&amp;id=69e89c6219fe3cd2cd8ddf84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33262-null-pointer-dereference-in-powerdn-72a50870</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33262%3A%20NULL%20Pointer%20Dereference%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33261-missing-support-for-integrity-check-be8bd4d0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33261%3A%20Missing%20Support%20for%20Integrity%20Check%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33260-allocation-of-resources-without-lim-19d1bdb2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33260%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33259-use-after-free-in-powerdns-recursor-95c1b6d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33259%3A%20Use%20After%20Free%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33258-allocation-of-resources-without-lim-07514143</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33258%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33257-allocation-of-resources-without-lim-9b25e45b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33257%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33256-allocation-of-resources-without-lim-c592daf9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33256%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33601-null-pointer-dereference-in-powerdn-0f9ceb69</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33601%3A%20NULL%20Pointer%20Dereference%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33600-null-pointer-dereference-in-powerdn-c8ce4796</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33600%3A%20NULL%20Pointer%20Dereference%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e898dd19fe3cd2cd8c392f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1913-cwe-79-improper-neutralization-of-in-235596af</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gallagherwebsitedesign%20Gallagher%20Website%20Design&amp;severity=medium&amp;id=69e898dd19fe3cd2cd8c3920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1930-cwe-862-missing-authorization-in-han-23ecaff9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1930%3A%20CWE-862%20Missing%20Authorization%20in%20hanicker%20Emailchef&amp;severity=medium&amp;id=69e898dd19fe3cd2cd8c3927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6848-insufficient-session-expiration-in-r-dfc7c1c4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6848%3A%20Insufficient%20Session%20Expiration%20in%20Red%20Hat%20Red%20Hat%20Quay%203&amp;severity=medium&amp;id=69e898dd19fe3cd2cd8c3932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-patches-450-vulnerabilities-with-april-2026-b6816a27</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Patches%20450%20Vulnerabilities%20With%20April%202026%20CPU&amp;severity=medium&amp;id=69e88ace19fe3cd2cd81f365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6846-heap-based-buffer-overflow-in-red-ha-6c30367e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6846%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69e88e5219fe3cd2cd83b858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6844-uncontrolled-resource-consumption-in-4106dfa8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6844%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e88e5219fe3cd2cd83b854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6843-use-of-externally-controlled-format--65b65110</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6843%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e88e5219fe3cd2cd83b850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6845-null-pointer-dereference-in-red-hat--7021dda0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6845%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4353-cwe-79-improper-neutralization-of-in-0a52d99e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cihubconnector%20CI%20HUB%20Connector&amp;severity=medium&amp;id=69e8877019fe3cd2cd80901f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4138-cwe-352-cross-site-request-forgery-c-bed04b69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4138%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nofearinc%20DX%20Unanswered%20Comments&amp;severity=medium&amp;id=69e8877019fe3cd2cd808fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6294-cwe-352-cross-site-request-forgery-c-c621007a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6294%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20byybora%20Google%20PageRank%20Display&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6236-cwe-79-improper-neutralization-of-in-a51a39a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lucdecri%20Posts%20map&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4117-cwe-862-missing-authorization-in-cal-77f5a788</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4117%3A%20CWE-862%20Missing%20Authorization%20in%20calj%20CalJ%20Shabbat%20Times&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4119-cwe-862-missing-authorization-in-jpp-12851972</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4119%3A%20CWE-862%20Missing%20Authorization%20in%20jppreus%20Create%20DB%20Tables&amp;severity=critical&amp;id=69e8876e19fe3cd2cd808e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4132-cwe-73-external-control-of-file-name-ede0442a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4132%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20zinoui%20HTTP%20Headers&amp;severity=high&amp;id=69e8877019fe3cd2cd808fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2719-cwe-79-improper-neutralization-of-in-64c1f05d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2719%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fpoller%20Private%20WP%20suite&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4121-cwe-352-cross-site-request-forgery-c-45c1a3d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4121%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ksolves%20Kcaptcha&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5748-cwe-79-improper-neutralization-of-in-885a583a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snedled%20Text%20Snippets&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4074-cwe-79-improper-neutralization-of-in-701c115c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4074%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karim42%20Quran%20Live%20Multilanguage&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4085-cwe-79-improper-neutralization-of-in-3ee50d45</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4085%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maltathemes%20Easy%20Social%20Photos%20Gallery%20%E2%80%93%20MIF&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6246-cwe-79-improper-neutralization-of-in-50f52a53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6246%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mkerstner%20Simple%20Random%20Posts%20Shortcode&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4142-cwe-79-improper-neutralization-of-in-716de4a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eazyserver%20Sentence%20To%20SEO%20(keywords%2C%20description%20and%20tags)&amp;severity=medium&amp;id=69e8877019fe3cd2cd809002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6235-cwe-862-missing-authorization-in-sen-1e57aff5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6235%3A%20CWE-862%20Missing%20Authorization%20in%20sendmachine%20Sendmachine%20for%20WordPress&amp;severity=critical&amp;id=69e8877219fe3cd2cd8093d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4090-cwe-352-cross-site-request-forgery-c-da9068d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4090%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ravster%20Inquiry%20cart&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2717-cwe-93-improper-neutralization-of-cr-71816c3c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2717%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20zinoui%20HTTP%20Headers&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4118-cwe-352-cross-site-request-forgery-c-ba11849e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4118%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tmarek%20Call%20To%20Action%20Plugin&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4139-cwe-352-cross-site-request-forgery-c-5640d79d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4139%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chsxf%20mCatFilter&amp;severity=medium&amp;id=69e8877019fe3cd2cd808ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4125-cwe-79-improper-neutralization-of-in-426b77f1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmkorg%20WPMK%20Block&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4128-cwe-862-missing-authorization-in-tpl-a47c6cb5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4128%3A%20CWE-862%20Missing%20Authorization%20in%20tplugins%20TP%20Restore%20Categories%20And%20Taxonomies&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5767-cwe-79-improper-neutralization-of-in-64b4f930</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5767%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20luetkemj%20SlideShowPro%20SC&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4089-cwe-79-improper-neutralization-of-in-434c6e6e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4089%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnnie2u%20Twittee%20Text%20Tweet&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3362-cwe-79-improper-neutralization-of-in-b499ef92</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itsananderson%20Short%20Comment%20Filter&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6396-cwe-352-cross-site-request-forgery-c-8c92df71</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6396%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webarea%20Fast%20%26%20Fancy%20Filter%20%E2%80%93%203F&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4280-cwe-22-improper-limitation-of-a-path-40a9b427</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4280%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20doctorwp%20Breaking%20News%20WP&amp;severity=medium&amp;id=69e8877019fe3cd2cd809016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4140-cwe-352-cross-site-request-forgery-c-408358f1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4140%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anzia%20Ni%20WooCommerce%20Order%20Export&amp;severity=medium&amp;id=69e8877019fe3cd2cd808ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4133-cwe-352-cross-site-request-forgery-c-cdc53135</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4133%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20textp2p%20TextP2P%20Texting%20Widget&amp;severity=medium&amp;id=69e8877019fe3cd2cd808fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4076-cwe-79-improper-neutralization-of-in-2e43ab74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20felipermendes%20Slider%20Bootstrap%20Carousel&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4126-cwe-200-exposure-of-sensitive-inform-5593e4bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4126%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20primisdigital%20Table%20Manager&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2714-cwe-79-improper-neutralization-of-in-aeaf694c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2714%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weblizar%20Institute%20Management%20%E2%80%93%20Learning%20Management%20System&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4088-cwe-79-improper-neutralization-of-in-1f2fc762</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpshouter%20Switch%20CTA%20Box&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1845-cwe-79-improper-neutralization-of-in-714efc56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bhubbard%20Real%20Estate%20Pro&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6041-cwe-79-improper-neutralization-of-in-9819e976</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6041%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mixer2%20Buzz%20Comments&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4131-cwe-352-cross-site-request-forgery-c-70210ccf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4131%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sphex1987%20WP%20Responsive%20Popup%20%2B%20Optin&amp;severity=medium&amp;id=69e8877019fe3cd2cd808fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4082-cwe-79-improper-neutralization-of-in-3b98007d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20erithq%20ER%20Swiffy%20Insert&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4279-cwe-79-improper-neutralization-of-in-e4682dd8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4279%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20breadbutter%20Bread%20%26%20Butter%3A%20AI-Powered%20Lead%20Intelligence&amp;severity=medium&amp;id=69e8877019fe3cd2cd80900f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1379-cwe-79-improper-neutralization-of-in-1f846bba</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zinoui%20HTTP%20Headers&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5820-cwe-79-improper-neutralization-of-in-23a26644</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sproutient%20Zypento%20Blocks&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6842-incorrect-permission-assignment-for--d9d71f2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6842%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69e87cbe19fe3cd2cd7bf973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6023-cwe-502-deserialization-of-untrusted-b293ba7b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6023%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Progress%20Software%20Telerik%20UI%20for%20ASP.NET%20AJAX&amp;severity=high&amp;id=69e87cbe19fe3cd2cd7bf970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6022-cwe-400-uncontrolled-resource-consum-dee17416</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6022%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Progress%20Software%20Telerik%20UI%20for%20ASP.NET%20AJAX&amp;severity=high&amp;id=69e87cbe19fe3cd2cd7bf96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40542-cwe-304-missing-critical-step-in-au-39bc90aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40542%3A%20CWE-304%3A%20Missing%20Critical%20Step%20in%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20HttpClient&amp;severity=high&amp;id=69e87cbe19fe3cd2cd7bf96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/march-2026-phishing-email-trends-report-39487dbc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=March%202026%20Phishing%20Email%20Trends%20Report&amp;severity=medium&amp;id=69e8876919fe3cd2cd808c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6840-cwe-129-improper-validation-of-array-e00e6759</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6840%3A%20CWE-129%20Improper%20validation%20of%20array%20index%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6839-cwe-1284-improper-validation-of-spec-e332e4dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6839%3A%20CWE-1284%20Improper%20validation%20of%20specified%20quantity%20in%20input%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41667-cwe-190-integer-overflow-or-wraparo-767ef7b5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41667%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41666-cwe-190-integer-overflow-or-wraparo-ef409e56</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41666%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41665-cwe-190-integer-overflow-or-wraparo-5acdbd90</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41665%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41664-cwe-190-integer-overflow-or-wraparo-a27f5e6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41664%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40450-cwe-190-integer-overflow-or-wraparo-f0f40248</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40450%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40449-cwe-190-integer-overflow-or-wraparo-610b3f4b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40449%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40448-cwe-190-integer-overflow-or-wraparo-5092d529</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40448%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22754-vulnerability-in-spring-spring-secu-e2bbf647</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22754%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=high&amp;id=69e8609e19fe3cd2cd714520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22753-vulnerability-in-spring-spring-secu-0e49ffc5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22753%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=high&amp;id=69e8609e19fe3cd2cd71451d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22748-vulnerability-in-spring-spring-secu-aa05584e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22748%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=medium&amp;id=69e8609e19fe3cd2cd71451a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22747-vulnerability-in-spring-spring-secu-54eefe85</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22747%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=medium&amp;id=69e8609e19fe3cd2cd714517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22746-vulnerability-in-spring-spring-secu-ccb3f5cb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22746%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=low&amp;id=69e8609e19fe3cd2cd714513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40451-cross-site-scripting-xss-in-deepl-c-0dc2de5b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40451%3A%20Cross-site%20scripting%20(XSS)%20in%20DeepL%20Chrome%20browser%20extension&amp;severity=medium&amp;id=69e85dc119fe3cd2cd708088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6835-cwe-434-unrestricted-upload-of-file--64dc3deb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6835%3A%20CWE-434%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20aEnrich%20a%2BHCM&amp;severity=medium&amp;id=69e8480219fe3cd2cd4cd5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6834-cwe-862-missing-authorization-in-aen-34aab48f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6834%3A%20CWE-862%20Missing%20Authorization%20in%20aEnrich%20a%2BHRD&amp;severity=high&amp;id=69e8480219fe3cd2cd4cd5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6833-cwe-89-improper-neutralization-of-sp-c4644e6c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6833%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20aEnrich%20a%2BHRD&amp;severity=high&amp;id=69e8480219fe3cd2cd4cd5a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-22nd-2026-httpsi-dc448848</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%2022nd%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9902%2C%20(Wed%2C%20Apr%2022nd)&amp;severity=medium&amp;id=69e82be219fe3cd2cd2e78ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6408-insufficiently-protected-credentials-5ee5cc77</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6408%3A%20Insufficiently%20Protected%20Credentials%20in%20Tanium%20Tanium%20Server&amp;severity=low&amp;id=69e8366d19fe3cd2cd3e6df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6392-exposure-of-sensitive-information-to-7a7525e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6392%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Tanium%20Threat%20Response&amp;severity=low&amp;id=69e8366d19fe3cd2cd3e6df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41458-cwe-362-concurrent-execution-using--d9b20473</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41458%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20owntone%20owntone-server&amp;severity=high&amp;id=69e8366d19fe3cd2cd3e6dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6416-uncontrolled-resource-consumption-in-6d82babd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6416%3A%20Uncontrolled%20Resource%20Consumption%20in%20Tanium%20Interact&amp;severity=low&amp;id=69e8366d19fe3cd2cd3e6df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41457-cwe-89-improper-neutralization-of-s-639e77d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41457%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20owntone%20owntone-server&amp;severity=medium&amp;id=69e8366d19fe3cd2cd3e6de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/same-packet-different-magic-hits-indias-banking-se-82b03368</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Same%20packet%2C%20different%20magic%3A%20Hits%20India&apos;s%20banking%20sector%20and%20Korea%20geopolitics&amp;severity=medium&amp;id=69e88ad519fe3cd2cd81f4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mach-o-man-malware-what-cisos-need-to-know-befa2a25</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mach-O%20Man%20Malware%3A%20What%20CISOs%20Need%20to%20Know&amp;severity=medium&amp;id=69e88ad519fe3cd2cd81f509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41146-cwe-400-uncontrolled-resource-consu-3c0472f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41146%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20boazsegev%20facil.io&amp;severity=high&amp;id=69e8285d19fe3cd2cd272487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-beyond-cryptojacking-telegram-td-95c3a6d7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Beyond%20Cryptojacking%3A%20Telegram%20tdata%20as%20a%20Credential%20Harvesting%20Vector%2C%20Lessons%20from%20a%20Honeypot%20Incident%2C%20(Wed%2C%20Apr%2022nd)&amp;severity=medium&amp;id=69e8134b19fe3cd2cd08f0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/avast-antivirus-2511-unquoted-service-path-41e04973</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AVAST%20Antivirus%2025.11%20-%20Unquoted%20Service%20Path&amp;severity=medium&amp;id=69ec2f5087115cfb68b9e9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-plugin-520-broken-access-control-3ecc7f5e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Plugin%20%205.2.0%20-%20Broken%20Access%20Control&amp;severity=medium&amp;id=69ec2f5087115cfb68b9e9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/throttlestop-kernel-driver-kernel-out-of-bounds-wr-2241e2d3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Throttlestop%20Kernel%20Driver%20-%20Kernel%20Out-of-Bounds%20Write%20Privilege%20Escalation&amp;severity=high&amp;id=69ec2f5087115cfb68b9e9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-23-1228cb05</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-23&amp;severity=medium&amp;id=69e9eb7f87115cfb68f9c891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-22-0db1dee2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-22&amp;severity=medium&amp;id=69e9626387115cfb6817f928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30139-na-f75ac939</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30139%3A%20n%2Fa&amp;severity=medium&amp;id=69e8e9bb19fe3cd2cdc88f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35548-na-ba622a4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35548%3A%20n%2Fa&amp;severity=high&amp;id=69e8e2b519fe3cd2cdc0df55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31192-na-9ab09595</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31192%3A%20n%2Fa&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdabfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-22-2d71dc32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-22&amp;severity=low&amp;id=69e83d6d19fe3cd2cd447496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41136-cwe-440-expected-behavior-violation-583653d1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41136%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20free5gc%20amf&amp;severity=medium&amp;id=69e8135419fe3cd2cd08f850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41135-cwe-400-uncontrolled-resource-consu-7d3553d9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41135%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20free5gc%20pcf&amp;severity=high&amp;id=69e80fc419fe3cd2cd07fdbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40343-cwe-754-improper-check-for-unusual--89e3a13b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40343%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20free5gc%20udr&amp;severity=medium&amp;id=69e80fc419fe3cd2cd07fdbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41130-cwe-918-server-side-request-forgery-dd054ecd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41130%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69e80c4119fe3cd2cd06bb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41129-cwe-918-server-side-request-forgery-f671e853</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41129%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69e80c4119fe3cd2cd06bb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41128-cwe-862-missing-authorization-in-cr-4617a4c3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41128%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craftcms%20cms&amp;severity=medium&amp;id=69e80c4119fe3cd2cd06bb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41304-cwe-77-improper-neutralization-of-s-2adf3dc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41304%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e808b919fe3cd2cd05c6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41064-cwe-78-improper-neutralization-of-s-446caa6f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41064%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69e808b919fe3cd2cd05c6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41063-cwe-79-improper-neutralization-of-i-f71f7022</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41063%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e8053519fe3cd2cd036939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41062-cwe-22-improper-limitation-of-a-pat-d34d858e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41062%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e8053519fe3cd2cd036933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41061-cwe-79-improper-neutralization-of-i-d5bdc732</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41061%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e8053519fe3cd2cd03692f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41060-cwe-918-server-side-request-forgery-4dd6fe68</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41060%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e85dc119fe3cd2cd70809d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41058-cwe-22-improper-limitation-of-a-pat-0ca30d9c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41058%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e85dc119fe3cd2cd708097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5845-cwe-639-authorization-bypass-through-af17f908</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5845%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69e85dc119fe3cd2cd7080a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41057-cwe-346-origin-validation-error-in--1586919e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41057%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e85dc119fe3cd2cd708093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41056-cwe-942-permissive-cross-domain-pol-0bdc9acc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41056%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e85dc119fe3cd2cd70808f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41055-cwe-918-server-side-request-forgery-386487f6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41055%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e7faaa19fe3cd2cd001495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3307-cwe-639-authorization-bypass-through-79d756ce</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3307%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd00147c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40935-cwe-804-guessable-captcha-in-wwbn-a-c3ef0f78</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40935%3A%20CWE-804%3A%20Guessable%20CAPTCHA%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd001491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40929-cwe-352-cross-site-request-forgery--c54c9475</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40929%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd00148d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40928-cwe-352-cross-site-request-forgery--08aee507</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40928%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd001489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5512-cwe-201-insertion-of-sensitive-infor-945674e9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5512%3A%20CWE-201%20Insertion%20of%20sensitive%20information%20into%20sent%20data%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd0014af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4296-cwe-185-incorrect-regular-expression-05c5a682</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4296%3A%20CWE-185%20Incorrect%20Regular%20Expression%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69e7faaa19fe3cd2cd00149b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40926-cwe-352-cross-site-request-forgery--6b4a43fa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40926%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e7faaa19fe3cd2cd001485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4821-cwe-78-improper-neutralization-of-sp-1de2eb07</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4821%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69e7faaa19fe3cd2cd0014a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5921-cwe-918-server-side-request-forgery--4913fb27</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5921%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69e7faad19fe3cd2cd001605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6832-cwe-22-improper-limitation-of-a-path-f71eef8c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6832%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nesquena%20hermes-webui&amp;severity=high&amp;id=69e7f3aa19fe3cd2cdfdaad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1354-cwe-322-in-zero-motorcycles-zero-mot-a0abde9a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1354%3A%20CWE-322%20in%20Zero%20Motorcycles%20Zero%20Motorcycles%20firmware&amp;severity=medium&amp;id=69e7f3aa19fe3cd2cdfdaacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6830-cwe-668-exposure-of-resource-to-wron-99db2e89</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6830%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20nesquena%20hermes-webui&amp;severity=medium&amp;id=69e7f01d19fe3cd2cdfcab55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40946-cwe-287-improper-authentication-in--d724c488</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40946%3A%20CWE-287%3A%20Improper%20Authentication%20in%20oxia-db%20oxia&amp;severity=critical&amp;id=69e7f01d19fe3cd2cdfcab4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40945-cwe-532-insertion-of-sensitive-info-eeb85fa3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40945%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20oxia-db%20oxia&amp;severity=high&amp;id=69e7f01d19fe3cd2cdfcab4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40944-cwe-295-improper-certificate-valida-a43a96b8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40944%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20oxia-db%20oxia&amp;severity=medium&amp;id=69e7f01d19fe3cd2cdfcab47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40943-cwe-362-concurrent-execution-using--5e16ae68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40943%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20oxia-db%20oxia&amp;severity=high&amp;id=69e7e91619fe3cd2cdfaec56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6829-cwe-22-improper-limitation-of-a-path-1c81624f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6829%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nesquena%20hermes-webui&amp;severity=medium&amp;id=69e7e91619fe3cd2cdfaec5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40942-cwe-670-always-incorrect-control-fl-d86330eb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40942%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20datasharingframework%20dsf&amp;severity=medium&amp;id=69e7e91619fe3cd2cdfaec51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40939-cwe-613-insufficient-session-expira-d36951cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40939%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20datasharingframework%20dsf&amp;severity=medium&amp;id=69e7e91619fe3cd2cdfaec4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40933-cwe-78-improper-neutralization-of-s-3bdaeff3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40933%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69e7e91619fe3cd2cdfaec46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6799-command-injection-in-comfast-cf-n1-s-d58e7057</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6799%3A%20Command%20Injection%20in%20Comfast%20CF-N1-S&amp;severity=medium&amp;id=69e7e91619fe3cd2cdfaec59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40931-cwe-59-improper-link-resolution-bef-1362973b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40931%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20node-modules%20compressing&amp;severity=high&amp;id=69e7e91619fe3cd2cdfaec43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40923-cwe-22-improper-limitation-of-a-pat-14596e0a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40923%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40924-cwe-400-uncontrolled-resource-consu-d9d1d16c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40924%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40938-cwe-88-improper-neutralization-of-a-83a710cd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40938%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20tektoncd%20pipeline&amp;severity=high&amp;id=69e7e5b119fe3cd2cdfa01c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6797-resource-consumption-in-sanluan-publ-05f04de8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6797%3A%20Resource%20Consumption%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33519-cwe-266-incorrect-privilege-assignm-042ac0c8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33519%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20(4.19.1)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=critical&amp;id=69e7e5a019fe3cd2cdf9f736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33518-cwe-266-incorrect-privilege-assignm-c42454a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33518%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20(4.19.1)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=critical&amp;id=69e7e5a019fe3cd2cdf9f733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6823-cwe-276-incorrect-default-permission-92b68079</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6823%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e7e5b119fe3cd2cdfa01ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35252-difficult-to-exploit-vulnerability--f1d78ce3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35252%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Security%20Service.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Security%20Service%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Security%20Service%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Security%20Service&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35251-difficult-to-exploit-vulnerability--741c5d88</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35251%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5b119fe3cd2cdfa01b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35250-easily-exploitable-vulnerability-al-9400abd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35250%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=low&amp;id=69e7e5b119fe3cd2cdfa01b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35249-easily-exploitable-vulnerability-al-08381c47</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35249%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=low&amp;id=69e7e5b119fe3cd2cdfa01b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35248-difficult-to-exploit-vulnerability--bcf69cdc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35248%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20VM%20VirtualBox%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20VM%20VirtualBox%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35247-easily-exploitable-vulnerability-al-dafc7f29</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35247%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa017c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35246-difficult-to-exploit-vulnerability--3c3a6a8f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35246%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5af19fe3cd2cdfa0178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35245-easily-exploitable-vulnerability-al-3cd45455</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35245%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20RDP%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5af19fe3cd2cdfa0174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35244-easily-exploitable-vulnerability-al-f55951e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35244%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hyperion%20Infrastructure%20Technology.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Hyperion%20Infrastructure%20Technology%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Hyperion%20Infrastructure%20Technology%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Hyperion%20Infrastructure%20Technology&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa016f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35243-easily-exploitable-vulnerability-al-bde9ac3d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35243%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Application%20Development%20Framework%20(ADF)%20executes%20to%20compromise%20Oracle%20Application%20Development%20Framework%20(ADF).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Application%20Development%20Framework%20(ADF).%20in%20Oracle%20Corporation%20Oracle%20Application%20Development%20Framework%20(ADF)&amp;severity=high&amp;id=69e7e5af19fe3cd2cdfa016b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35242-difficult-to-exploit-vulnerability--616450eb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35242%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5af19fe3cd2cdfa0164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35241-easily-exploitable-vulnerability-al-680ee5e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35241%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20CS%20Student%20Records.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20CS%20Student%20Records%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20CS%20Student%20Records&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa0160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35240-easily-exploitable-vulnerability-al-1a43e1c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35240%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa015c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35239-easily-exploitable-vulnerability-al-ae52294e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35239%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa0159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35238-easily-exploitable-vulnerability-al-b0056cbb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35238%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa0156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35237-easily-exploitable-vulnerability-al-cb542661</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35237%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35236-easily-exploitable-vulnerability-al-cd31b948</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35236%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35235-easily-exploitable-vulnerability-al-4a1fef17</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35235%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35234-easily-exploitable-vulnerability-al-4cc52e09</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35234%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35232-easily-exploitable-vulnerability-al-c19d6b44</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35232%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Fusion%20Middleware.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Fusion%20Middleware%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Fusion%20Middleware%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Fusion%20Middleware%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Fusion%20Middleware&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35231-easily-exploitable-vulnerability-al-ca27511c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35231%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Transaction%20Filtering.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Transaction%20Filtering%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Transaction%20Filtering&amp;severity=high&amp;id=69e7e5ad19fe3cd2cdfa00d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35230-difficult-to-exploit-vulnerability--e0211fb0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35230%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5ad19fe3cd2cdfa00cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35229-easily-exploitable-vulnerability-al-ee698b4e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35229%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Java%20VM.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Java%20VM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=69e7e5ad19fe3cd2cdfa00ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34325-easily-exploitable-vulnerability-al-abff44fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34325%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20executes%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34324-easily-exploitable-vulnerability-al-51d56e29</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34324%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20InForm.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20InForm&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34323-easily-exploitable-vulnerability-al-6b8cb532</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34323%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20InForm.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Life%20Sciences%20InForm.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20InForm&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34321-difficult-to-exploit-vulnerability--111fb184</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34321%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34320-easily-exploitable-vulnerability-al-bda45419</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34320%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Customer%20Screening.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Customer%20Screening%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Customer%20Screening&amp;severity=high&amp;id=69e7e5ab19fe3cd2cdf9fa0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34319-easily-exploitable-vulnerability-al-4e4c2f90</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34319%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Shell%20executes%20to%20compromise%20MySQL%20Shell.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Shell.%20in%20Oracle%20Corporation%20MySQL%20Shell&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34318-difficult-to-exploit-vulnerability--dc47f419</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34318%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Shell.%20%20While%20the%20vulnerability%20is%20in%20MySQL%20Shell%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20MySQL%20Shell%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Shell&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34317-easily-exploitable-vulnerability-al-65f524db</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34317%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Shell%20executes%20to%20compromise%20MySQL%20Shell.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Shell.%20in%20Oracle%20Corporation%20MySQL%20Shell&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34315-easily-exploitable-vulnerability-al-68ca386d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34315%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9f9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34314-difficult-to-exploit-vulnerability--1605401c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34314%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9f9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34313-easily-exploitable-vulnerability-al-ea2ce21c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34313%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9f9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34312-easily-exploitable-vulnerability-al-a6403caa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34312%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20Row%20Access%20Method%20privilege%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20RDBMS.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20RDBMS%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=69e7e5ab19fe3cd2cdf9f9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34310-easily-exploitable-vulnerability-al-517f6a28</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34310%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=69e7e5a819fe3cd2cdf9f9bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34309-easily-exploitable-vulnerability-al-25188087</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34309%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=high&amp;id=69e7e5a819fe3cd2cdf9f9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34308-easily-exploitable-vulnerability-al-6d2ecc90</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34308%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34307-easily-exploitable-vulnerability-al-2ea9f00c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34307%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34306-easily-exploitable-vulnerability-al-867314f9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34306%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Project%20Costing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20Project%20Costing%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Project%20Costing&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34305-easily-exploitable-vulnerability-al-fba24128</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34305%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=high&amp;id=69e7e5a819fe3cd2cdf9f9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34304-easily-exploitable-vulnerability-al-5b4cfd00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34304%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34303-easily-exploitable-vulnerability-al-35d5403d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34303%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34302-easily-exploitable-vulnerability-al-60adad84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34302%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Workflow.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Workflow%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Workflow%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Workflow.%20in%20Oracle%20Corporation%20Oracle%20Workflow&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34301-easily-exploitable-vulnerability-al-9c1caf91</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34301%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34300-easily-exploitable-vulnerability-al-43d3b9df</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34300%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Contracts.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20Contracts%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Contracts&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34299-easily-exploitable-vulnerability-al-34588aa0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34299%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34298-easily-exploitable-vulnerability-al-e08eb1ed</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34298%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Applications%20Framework%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Applications%20Framework.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34297-easily-exploitable-vulnerability-al-c5c480b4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34297%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20HCM%20Common%20Architecture.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20HCM%20Common%20Architecture%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20HCM%20Common%20Architecture&amp;severity=high&amp;id=69e7e5a619fe3cd2cdf9f944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34296-easily-exploitable-vulnerability-al-b30c9df5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34296%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34295-easily-exploitable-vulnerability-al-6c672982</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34295%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20SCM%20Purchasing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20SCM%20Purchasing%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20SCM%20Purchasing&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34294-difficult-to-exploit-vulnerability--4500c6f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34294%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20LDAP%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34293-easily-exploitable-vulnerability-al-1ae4a929</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34293%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34292-easily-exploitable-vulnerability-al-6bf0d821</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34292%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20WebLogic%20Server.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=high&amp;id=69e7e5a619fe3cd2cdf9f935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34291-difficult-to-exploit-vulnerability--a9179d48</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34291%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20HTTP%20Server.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20HTTP%20Server%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20HTTP%20Server%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20HTTP%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20HTTP%20Server&amp;severity=high&amp;id=69e7e5a619fe3cd2cdf9f932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34290-easily-exploitable-vulnerability-al-470c16d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34290%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20TCP%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Identity%20Manager%20Connector.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=high&amp;id=69e7e5a419fe3cd2cdf9f897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34289-difficult-to-exploit-vulnerability--05decebe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34289%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34288-difficult-to-exploit-vulnerability--203b1528</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34288%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34287-easily-exploitable-vulnerability-al-550119fe</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34287%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=critical&amp;id=69e7e5a419fe3cd2cdf9f88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34286-easily-exploitable-vulnerability-al-d881b9c0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34286%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=critical&amp;id=69e7e5a419fe3cd2cdf9f88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34285-easily-exploitable-vulnerability-al-35cc1d95</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34285%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=critical&amp;id=69e7e5a419fe3cd2cdf9f888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34284-easily-exploitable-vulnerability-al-4dc75d71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34284%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Business%20Process%20Management%20Suite.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Business%20Process%20Management%20Suite%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Business%20Process%20Management%20Suite%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Business%20Process%20Management%20Suite%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Business%20Process%20Management%20Suite&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34283-easily-exploitable-vulnerability-al-5588ac23</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34283%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Identity%20Manager.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Identity%20Manager%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Identity%20Manager%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Identity%20Manager%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34282-easily-exploitable-vulnerability-al-3c3041bd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34282%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=69e7e5a419fe3cd2cdf9f87f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34281-easily-exploitable-vulnerability-al-ba202de7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34281%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Solaris%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f87c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34280-easily-exploitable-vulnerability-al-5a2fbe50</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34280%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34279-easily-exploitable-vulnerability-al-747999fb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34279%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Enterprise%20Manager%20Base%20Platform.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Enterprise%20Manager%20Base%20Platform%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Enterprise%20Manager%20Base%20Platform.%20in%20Oracle%20Corporation%20Oracle%20Enterprise%20Manager%20Base%20Platform&amp;severity=critical&amp;id=69e7e5a219fe3cd2cdf9f7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34278-easily-exploitable-vulnerability-al-a5e5aab1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34278%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34277-easily-exploitable-vulnerability-al-33d3fe45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34277%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20While%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20PeopleSoft%20Enterprise%20PeopleTools.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34276-easily-exploitable-vulnerability-al-e6614517</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34276%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34275-easily-exploitable-vulnerability-al-c3b09337</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34275%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Advanced%20Inbound%20Telephony.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Advanced%20Inbound%20Telephony.%20in%20Oracle%20Corporation%20Oracle%20Advanced%20Inbound%20Telephony&amp;severity=critical&amp;id=69e7e5a219fe3cd2cdf9f7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34274-easily-exploitable-vulnerability-al-ac7ffdd2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34274%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Configurator.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Configurator%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Configurator%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Configurator%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Configurator&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34273-easily-exploitable-vulnerability-al-e6893b84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34273%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20GoldenGate.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20GoldenGate%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20GoldenGate&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34272-easily-exploitable-vulnerability-al-504539ad</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34272%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34271-easily-exploitable-vulnerability-al-e1275dcd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34271%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34270-easily-exploitable-vulnerability-al-52dd5e0e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34270%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34269-easily-exploitable-vulnerability-al-767fe6df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34269%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34268-difficult-to-exploit-vulnerability--fe0f71c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34268%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=69e7e5a019fe3cd2cdf9f73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34267-easily-exploitable-vulnerability-al-abc37fab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34267%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f73c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34266-easily-exploitable-vulnerability-al-3a9864e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34266%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Absence%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20HCM%20Absence%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20HCM%20Absence%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Absence%20Management&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22021-easily-exploitable-vulnerability-al-a4ccec3c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22021%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22019-easily-exploitable-vulnerability-al-954919a7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22019%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22018-difficult-to-exploit-vulnerability--7e8eda12</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22018%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=69e7e5a019fe3cd2cdf9f72a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22017-easily-exploitable-vulnerability-al-eff7e52b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22017%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59e19fe3cd2cdf9f6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22016-easily-exploitable-vulnerability-al-0284ad33</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22016%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=69e7e59e19fe3cd2cdf9f6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22015-easily-exploitable-vulnerability-al-7475e114</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22015%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59e19fe3cd2cdf9f6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22014-easily-exploitable-vulnerability-al-7b8e4ec4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22014%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20User%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20User%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20User%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20User%20Management&amp;severity=low&amp;id=69e7e59e19fe3cd2cdf9f6eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22013-difficult-to-exploit-vulnerability--0c471c87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22013%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69e7e59e19fe3cd2cdf9f6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22011-difficult-to-exploit-vulnerability--4aca61a3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22011%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20DBA.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Applications%20DBA%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Applications%20DBA.%20in%20Oracle%20Corporation%20Oracle%20Applications%20DBA&amp;severity=high&amp;id=69e7e59e19fe3cd2cdf9f6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22010-easily-exploitable-vulnerability-al-9dc3a036</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22010%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=69e7e59e19fe3cd2cdf9f6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22009-easily-exploitable-vulnerability-al-fe131e6a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22009%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59e19fe3cd2cdf9f6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22008-difficult-to-exploit-vulnerability--a130f8c7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22008%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=69e7e59e19fe3cd2cdf9f6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22007-difficult-to-exploit-vulnerability--2c72cd1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22007%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=69e7e59e19fe3cd2cdf9f6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22006-easily-exploitable-vulnerability-al-36a607fb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22006%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22005-easily-exploitable-vulnerability-al-ae98800c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22005%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22004-easily-exploitable-vulnerability-al-014291e7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22004%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f61a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22003-difficult-to-exploit-vulnerability--5c9d19cd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22003%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22002-easily-exploitable-vulnerability-al-c5acb921</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22002%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22001-easily-exploitable-vulnerability-al-efde5d7a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22001%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=69e7e59b19fe3cd2cdf9f611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21999-difficult-to-exploit-vulnerability--fe96ff08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21999%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20XML%20Database.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20XML%20Database%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21998-easily-exploitable-vulnerability-al-53e27637</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21998%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21997-easily-exploitable-vulnerability-al-824cd0dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21997%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Empirica%20Signal.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Life%20Sciences%20Empirica%20Signal%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Life%20Sciences%20Empirica%20Signal%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20Empirica%20Signal%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Empirica%20Signal&amp;severity=high&amp;id=69e7e59b19fe3cd2cdf9f608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6796-cleartext-storage-in-a-file-or-on-di-93cd932a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6796%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69e7e20f19fe3cd2cdf8e298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40910-cwe-287-improper-authentication-in--c0f68c00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40910%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fatedier%20frp&amp;severity=medium&amp;id=69e7e20f19fe3cd2cdf8e2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40906-cwe-89-improper-neutralization-of-s-06dc3129</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40906%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20electric-sql%20electric&amp;severity=critical&amp;id=69e85dc119fe3cd2cd7080aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40905-cwe-601-url-redirection-to-untruste-9f74800f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40905%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69e7e5b319fe3cd2cdfa0215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40925-cwe-352-cross-site-request-forgery--d3211bbb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40925%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e7e5b319fe3cd2cdfa0218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40911-cwe-94-improper-control-of-generati-3a34b5ff</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40911%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69e85dc119fe3cd2cd7080ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40892-cwe-121-stack-based-buffer-overflow-0b664e79</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40892%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69e7e20f19fe3cd2cdf8e29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40909-cwe-22-improper-limitation-of-a-pat-cd494b92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40909%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e7d78519fe3cd2cdf5b338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40908-cwe-200-exposure-of-sensitive-infor-617b1d07</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40908%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7d78519fe3cd2cdf5b335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40890-cwe-125-out-of-bounds-read-in-gomar-d544ae9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40890%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gomarkdown%20markdown&amp;severity=high&amp;id=69e7d78519fe3cd2cdf5b32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40907-cwe-639-authorization-bypass-throug-6904107b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40907%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7d78519fe3cd2cdf5b331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40903-cwe-829-inclusion-of-functionality--b78a4e14</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40903%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69e7d78519fe3cd2cdf5b32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6819-cwe-276-incorrect-default-permission-bab31088</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6819%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e7d78819fe3cd2cdf5b386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40885-cwe-200-exposure-of-sensitive-infor-a89dd21b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40885%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69e7d78519fe3cd2cdf5b322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40884-cwe-306-missing-authentication-for--2f6a8641</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40884%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69e7d78519fe3cd2cdf5b31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40883-cwe-352-cross-site-request-forgery--6def37d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40883%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20patrickhener%20goshs&amp;severity=medium&amp;id=69e7d78519fe3cd2cdf5b31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40876-cwe-22-improper-limitation-of-a-pat-b9e7a983</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40876%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69e7d78519fe3cd2cdf5b319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41320-cwe-89-improper-neutralization-of-s-2bd55248</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41320%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20frappe%20hrms&amp;severity=medium&amp;id=69e7d78819fe3cd2cdf5b383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40889-cwe-284-improper-access-control-in--64817524</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40889%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20frappe%20hrms&amp;severity=medium&amp;id=69e7d78519fe3cd2cdf5b325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40888-cwe-284-improper-access-control-in--9ee9be60</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40888%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20frappe%20hrms&amp;severity=medium&amp;id=69e7d08b19fe3cd2cdf3fbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40887-cwe-89-improper-neutralization-of-s-38303427</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40887%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vendurehq%20vendure&amp;severity=critical&amp;id=69e7d08b19fe3cd2cdf3fbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40878-cwe-79-improper-neutralization-of-i-7784261b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40878%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=low&amp;id=69e7d08919fe3cd2cdf3fb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33812-cwe-789-memory-allocation-with-exce-17d95bcb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33812%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20golang.org%2Fx%2Fimage%20golang.org%2Fx%2Fimage%2Ffont%2Fsfnt&amp;severity=medium&amp;id=69e7d08919fe3cd2cdf3fb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33813-cwe-190-integer-overflow-or-wraparo-0df99465</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33813%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20golang.org%2Fx%2Fimage%20golang.org%2Fx%2Fimage%2Fwebp&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40881-cwe-770-allocation-of-resources-wit-d7ab014b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40881%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ZcashFoundation%20zebrad&amp;severity=medium&amp;id=69e7d08b19fe3cd2cdf3fbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40372-cwe-347-improper-verification-of-cr-0bd8d1a9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40372%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20ASP.NET%20Core%2010.0&amp;severity=critical&amp;id=69e7d08919fe3cd2cdf3fb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40875-cwe-79-improper-neutralization-of-i-9045547c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40875%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40880-cwe-1025-comparison-using-wrong-fac-76709282</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40880%3A%20CWE-1025%3A%20Comparison%20Using%20Wrong%20Factors%20in%20ZcashFoundation%20zebrad&amp;severity=high&amp;id=69e7d08b19fe3cd2cdf3fbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40874-cwe-284-improper-access-control-in--d9bb75f4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40874%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20mailcow%20mailcow-dockerized&amp;severity=medium&amp;id=69e7d08919fe3cd2cdf3fb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40873-cwe-79-improper-neutralization-of-i-33d3fed3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40873%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40872-cwe-79-improper-neutralization-of-i-ba112c91</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40872%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=critical&amp;id=69e7d08919fe3cd2cdf3fb16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40879-cwe-674-uncontrolled-recursion-in-n-f4701631</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40879%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20nestjs%20nest&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40871-cwe-20-improper-input-validation-in-d8f4f9f3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40871%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20mailcow%20mailcow-dockerized&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22751-vulnerability-in-spring-spring-secu-5bf72cfe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22751%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=medium&amp;id=69e7c5ee19fe3cd2cdf0babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6745-cross-site-scripting-in-bagisto-02bed925</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6745%3A%20Cross%20Site%20Scripting%20in%20Bagisto&amp;severity=medium&amp;id=69e7c5ee19fe3cd2cdf0bad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40867-cwe-284-improper-access-control-in--21cbe18f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40867%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=69e7c5ee19fe3cd2cdf0bacc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40866-cwe-284-improper-access-control-in--700fc40a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40866%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=69e7c5ee19fe3cd2cdf0bac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40865-cwe-284-improper-access-control-in--5574dc11</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40865%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=69e7c5ee19fe3cd2cdf0bac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40614-cwe-122-heap-based-buffer-overflow--1e2849e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40614%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69e7c5ee19fe3cd2cdf0bac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6744-server-side-request-forgery-in-bagis-7c5ba74f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6744%3A%20Server-Side%20Request%20Forgery%20in%20Bagisto&amp;severity=medium&amp;id=69e7c5ee19fe3cd2cdf0bacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40611-cwe-22-improper-limitation-of-a-pat-6f07a5f7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40611%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20go-acme%20lego&amp;severity=high&amp;id=69e7bb7219fe3cd2cdedac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40608-cwe-770-allocation-of-resources-wit-a616a4f7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40608%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20DayuanJiang%20next-ai-draw-io&amp;severity=medium&amp;id=69e7bb7219fe3cd2cdedac8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40604-cwe-693-protection-mechanism-failur-03a23c53</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40604%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69e7bb7219fe3cd2cdedac8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40602-cwe-94-improper-control-of-generati-0f481d7d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40602%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20home-assistant-ecosystem%20home-assistant-cli&amp;severity=medium&amp;id=69e7bb7219fe3cd2cdedac86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40599-cwe-863-incorrect-authorization-in--53044a58</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40599%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69e7bb7219fe3cd2cdedac83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41194-cwe-352-cross-site-request-forgery--0f8a82fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41194%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b7ed19fe3cd2cdec7cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41193-cwe-22-improper-limitation-of-a-pat-0985c242</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41193%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69e7b7ed19fe3cd2cdec7cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41192-cwe-862-missing-authorization-in-fr-164129b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41192%3A%20CWE-862%3A%20Missing%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b7ed19fe3cd2cdec7ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40588-cwe-620-unverified-password-change--85d449f2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40588%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20blueprintue%20blueprintue-self-hosted-edition&amp;severity=high&amp;id=69e7b7ed19fe3cd2cdec7cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40587-cwe-613-insufficient-session-expira-f3fe64bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40587%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20blueprintue%20blueprintue-self-hosted-edition&amp;severity=medium&amp;id=69e7b7ed19fe3cd2cdec7cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40586-cwe-307-improper-restriction-of-exc-0a194121</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40586%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20blueprintue%20blueprintue-self-hosted-edition&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41191-cwe-863-incorrect-authorization-in--8ff90e23</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41191%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e619fe3cd2cde9a4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40585-cwe-640-weak-password-recovery-mech-ef87095c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40585%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20blueprintue%20blueprintue-self-hosted-edition&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41190-cwe-863-incorrect-authorization-in--6a3ccd65</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41190%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e619fe3cd2cde9a4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41189-cwe-863-incorrect-authorization-in--a66c49d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41189%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e619fe3cd2cde9a4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41183-cwe-200-exposure-of-sensitive-infor-45bcd11f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41183%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b0e619fe3cd2cde9a4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21571-os-command-injection-in-atlassian-b-ae340b39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21571%3A%20OS%20Command%20Injection%20in%20Atlassian%20Bamboo%20Data%20Center&amp;severity=critical&amp;id=69e7b0e319fe3cd2cde9a455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40583-cwe-460-improper-cleanup-on-thrown--e62ad37f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40583%3A%20CWE-460%3A%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20UltraDAGcom%20core&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40592-cwe-862-missing-authorization-in-fr-8688a807</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40592%3A%20CWE-862%3A%20Missing%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b0e619fe3cd2cde9a4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40591-cwe-639-authorization-bypass-throug-a6329c29</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40591%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e619fe3cd2cde9a4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40590-cwe-639-authorization-bypass-throug-4f251147</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40590%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b0e619fe3cd2cde9a4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40589-cwe-639-authorization-bypass-throug-73df512f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40589%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40050-cwe-306-missing-authentication-for--9cf60429</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40050%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20CrowdStrike%20LogScale%20Self-Hosted&amp;severity=critical&amp;id=69e7b0e319fe3cd2cde9a45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40570-cwe-639-authorization-bypass-throug-bdcd0606</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40570%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b0e319fe3cd2cde9a467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40569-cwe-284-improper-access-control-in--03df557d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40569%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69e7b0e319fe3cd2cde9a462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40576-cwe-22-improper-limitation-of-a-pat-5a20dab2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40576%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20haris-musa%20excel-mcp-server&amp;severity=critical&amp;id=69e7a9cf19fe3cd2cde6d34d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5652-cwe-639-authorization-bypass-through-99c29aa9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5652%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=critical&amp;id=69e7a9cf19fe3cd2cde6d350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ngate-variant-hides-in-a-trojanized-nfc-paymen-67781914</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20NGate%20variant%20hides%20in%20a%20trojanized%20NFC%20payment%20app&amp;severity=medium&amp;id=69e8876919fe3cd2cd808c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6743-cross-site-scripting-in-websystems-w-c738537f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6743%3A%20Cross%20Site%20Scripting%20in%20WebSystems%20WebTOTUM&amp;severity=medium&amp;id=69e7a9cf19fe3cd2cde6d353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40161-cwe-201-insertion-of-sensitive-info-d982eabc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40161%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20tektoncd%20pipeline&amp;severity=high&amp;id=69e7a9cf19fe3cd2cde6d348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35451-cwe-79-improper-neutralization-of-i-61801c57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35451%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20twentyhq%20twenty&amp;severity=medium&amp;id=69e7a9cf19fe3cd2cde6d344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29179-cwe-863-incorrect-authorization-in--0ff5534d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29179%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20octobercms%20october&amp;severity=low&amp;id=69e7a64f19fe3cd2cde569c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24189-cwe-125-out-of-bounds-read-in-nvidi-3d3c5fe9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24189%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20CUDA-Q&amp;severity=high&amp;id=69e7a64f19fe3cd2cde569b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24177-cwe-306-missing-authentication-for--2939e8de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24177%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NVIDIA%20KAI%20Scheduler&amp;severity=high&amp;id=69e7a64f19fe3cd2cde569ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27937-cwe-79-improper-neutralization-of-i-7782ad1c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27937%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=low&amp;id=69e7a64f19fe3cd2cde569c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24176-cwe-863-incorrect-authorization-in--8c82f828</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24176%3A%20CWE-863%20Incorrect%20Authorization%20in%20NVIDIA%20KAI%20Scheduler&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26274-cwe-184-incomplete-list-of-disallow-8bd90ae5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26274%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20octobercms%20october&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26067-cwe-863-incorrect-authorization-in--83ab9d20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26067%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20octobercms%20october&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40568-cwe-79-improper-neutralization-of-i-88d3a761</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40568%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7a65119fe3cd2cde569fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40567-cwe-116-improper-encoding-or-escapi-816aa455</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40567%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25542-cwe-185-incorrect-regular-expressio-f6516f4c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25542%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40566-cwe-918-server-side-request-forgery-a36f6f36</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40566%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40565-cwe-79-improper-neutralization-of-i-5b151c9e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40565%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e79f4219fe3cd2cde2398a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15638-cwe-1395-dependency-on-vulnerable-t-9d7fb978</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15638%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20ATRODO%20Net%3A%3ADropbear&amp;severity=critical&amp;id=69e79f4219fe3cd2cde23981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40498-cwe-200-exposure-of-sensitive-infor-522bd98d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40498%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7983919fe3cd2cddfb24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41029-cwe-89-improper-neutralization-of-s-bd938344</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41029%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Zeon%20Global%20Tech%20Zeon%20Academy%20Pro&amp;severity=critical&amp;id=69e7983919fe3cd2cddfb248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3298-cwe-787-out-of-bounds-write-in-pytho-b8d27af6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3298%3A%20CWE-787%20Out-of-bounds%20write%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69e7913319fe3cd2cddd4302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/third-us-security-expert-admits-helping-ransomware-74f42e2e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Third%20US%20Security%20Expert%20Admits%20Helping%20Ransomware%20Gang&amp;severity=medium&amp;id=69e78daf19fe3cd2cddbe9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31981-cwe-319-cleartext-transmission-of-s-2e6e3d9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31981%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20HCLSoftware%20BigFix%20Service%20Management%20(SM)&amp;severity=medium&amp;id=69e7913319fe3cd2cddd42f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1089-cwe-74-improper-neutralization-of-sp-8cd96290</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1089%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0972-cwe-307-improper-restriction-of-exce-c937cc23</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0972%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0971-cwe-613-insufficient-session-expirat-b43043cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0971%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14362-cwe-307-improper-restriction-of-exc-13ac78f7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14362%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=high&amp;id=69e78a2b19fe3cd2cdda97df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1241-cwe-326-inadequate-encryption-streng-4a3e3d6d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1241%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dozens-of-malicious-crypto-apps-land-in-apple-app--efc49ec6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dozens%20of%20Malicious%20Crypto%20Apps%20Land%20in%20Apple%20App%20Store&amp;severity=medium&amp;id=69e786a719fe3cd2cdd94797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31958-cwe-444-inconsistent-interpretation-780bdea3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31958%3A%20CWE-444%20Inconsistent%20interpretation%20of%20HTTP%20requests%20(&apos;HTTP%20Request%2FResponse%20smuggling&apos;)%20in%20HCLSoftware%20BigFix%20Service%20Management%20(SM)&amp;severity=low&amp;id=69e78a2b19fe3cd2cdda97e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6786-vulnerability-in-mozilla-firefox-c7dc35e6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6786%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a419fe3cd2cdd1666b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6785-vulnerability-in-mozilla-firefox-6e2b9d34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6785%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a419fe3cd2cdd16665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6784-vulnerability-in-mozilla-firefox-e6175a94</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6784%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd1662e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6783-vulnerability-in-mozilla-firefox-afc57616</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6783%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6782-vulnerability-in-mozilla-firefox-28f5a500</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6782%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd16625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6781-vulnerability-in-mozilla-firefox-9197f035</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6781%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd16621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6780-vulnerability-in-mozilla-firefox-d3eae43f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6780%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd1661d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6779-vulnerability-in-mozilla-firefox-79181267</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6779%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6778-vulnerability-in-mozilla-firefox-43480df6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6778%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6777-vulnerability-in-mozilla-firefox-6c2ce61a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6777%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6776-vulnerability-in-mozilla-firefox-f98abd05</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6776%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd1660c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6775-vulnerability-in-mozilla-firefox-5d98590c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6775%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6774-vulnerability-in-mozilla-firefox-5199b680</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6774%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789e19fe3cd2cdd164ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6773-vulnerability-in-mozilla-firefox-33037a25</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6773%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789e19fe3cd2cdd164c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40520-cwe-78-improper-neutralization-of-s-099f84e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40520%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20api&amp;severity=high&amp;id=69e7789819fe3cd2cdd1623b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6772-vulnerability-in-mozilla-firefox-0f432745</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6772%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789e19fe3cd2cdd164c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6771-vulnerability-in-mozilla-firefox-18267380</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6771%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69e7789e19fe3cd2cdd164bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6770-vulnerability-in-mozilla-firefox-82935fdd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6770%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789e19fe3cd2cdd164b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6769-vulnerability-in-mozilla-firefox-7d15a9d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6769%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789e19fe3cd2cdd164b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6768-vulnerability-in-mozilla-firefox-55047e0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6768%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69e7789e19fe3cd2cdd164ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6767-vulnerability-in-mozilla-firefox-4e761dc0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6767%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789e19fe3cd2cdd164a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6766-vulnerability-in-mozilla-firefox-88974ce9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6766%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789e19fe3cd2cdd164a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6765-vulnerability-in-mozilla-firefox-29539157</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6765%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789e19fe3cd2cdd1649d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6764-vulnerability-in-mozilla-firefox-ece1348c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6764%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6763-vulnerability-in-mozilla-firefox-ffe9f141</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6763%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6762-vulnerability-in-mozilla-firefox-6371567f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6762%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6761-vulnerability-in-mozilla-firefox-567e17b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6761%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789c19fe3cd2cdd163e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6760-vulnerability-in-mozilla-firefox-2a44a5a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6760%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69e7789c19fe3cd2cdd163df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6759-vulnerability-in-mozilla-firefox-c42f7b28</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6759%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789c19fe3cd2cdd163da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6758-vulnerability-in-mozilla-firefox-73a7faa7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6758%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789c19fe3cd2cdd163d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6757-vulnerability-in-mozilla-firefox-536b8d82</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6757%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6756-vulnerability-in-mozilla-firefox-5a5960e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6756%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789c19fe3cd2cdd163cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6755-vulnerability-in-mozilla-firefox-6af9a412</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6755%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6754-vulnerability-in-mozilla-firefox-cde18b2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6754%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd1626d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6753-vulnerability-in-mozilla-firefox-ce0c3cfc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6753%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6752-vulnerability-in-mozilla-firefox-c6833d24</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6752%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6751-vulnerability-in-mozilla-firefox-c3bd5d8b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6751%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd1625d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6750-vulnerability-in-mozilla-firefox-be82c19c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6750%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6749-vulnerability-in-mozilla-firefox-a12ebed7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6749%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6748-vulnerability-in-mozilla-firefox-a414d93c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6748%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69e7789819fe3cd2cdd1624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6747-vulnerability-in-mozilla-firefox-6911b2ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6747%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6746-vulnerability-in-mozilla-firefox-7da0070b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6746%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unsecured-perforce-servers-expose-sensitive-data-f-f9a1d370</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unsecured%20Perforce%20Servers%20Expose%20Sensitive%20Data%20From%20Major%20Orgs&amp;severity=low&amp;id=69e7718d19fe3cd2cdcf669d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/progress-patches-multiple-vulnerabilities-in-movei-0865d57c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Progress%20Patches%20Multiple%20Vulnerabilities%20in%20MOVEit%20WAF%2C%20LoadMaster&amp;severity=critical&amp;id=69e76a8619fe3cd2cdcd2f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/highly-destructive-lotus-wiper-used-in-a-targeted--55ae9b6d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Highly%20destructive%20Lotus%20Wiper%20used%20in%20a%20targeted%20attack&amp;severity=medium&amp;id=69e794b519fe3cd2cdde14d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/void-dokkaebi-uses-fake-job-interview-lure-to-spre-e0c358ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Void%20Dokkaebi%20Uses%20Fake%20Job%20Interview%20Lure%20to%20Spread%20Malware%20via%20Code%20Repositories&amp;severity=medium&amp;id=69e7983919fe3cd2cddfb206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32147-cwe-22-improper-limitation-of-a-pat-3bf12671</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32147%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69e76a9219fe3cd2cdcd3204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-cisco-kentico-zi-bdb1bac9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Cisco%2C%20Kentico%2C%20Zimbra%20Vulnerabilities&amp;severity=medium&amp;id=69e75ffc19fe3cd2cdc9da8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-breaches-at-healthcare-organizations-in-illin-a2987dbc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Breaches%20at%20Healthcare%20Organizations%20in%20Illinois%20and%20Texas%20Affect%20600%2C000&amp;severity=medium&amp;id=69e75c7919fe3cd2cdc919ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41039-cwe-306-missing-authentication-for--80836606</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41039%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Quantum%20Networks%20Router%20QN-I-470&amp;severity=high&amp;id=69e7556d19fe3cd2cdc6eda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41038-cwe-521-weak-password-requirements--6f560b49</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41038%3A%20CWE-521%20Weak%20password%20requirements%20in%20Quantum%20Networks%20Router%20QN-I-470&amp;severity=high&amp;id=69e7556d19fe3cd2cdc6eda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41036-cwe-78-improper-neutralization-of-s-3995b27c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41036%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Quantum%20Networks%20Router%20QN-I-470&amp;severity=high&amp;id=69e74ecd19fe3cd2cdc4b538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41037-cwe-78-improper-neutralization-of-s-9a175a9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41037%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20Quantum%20Networks%20Router%20QN-I-470&amp;severity=high&amp;id=69e74ecd19fe3cd2cdc4b53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6553-cwe-312-cleartext-storage-of-sensiti-cf5d9eb4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6553%3A%20CWE-312%20Cleartext%20storage%20of%20sensitive%20information%20in%20TYPO3%20TYPO3%20CMS&amp;severity=high&amp;id=69e74ecd19fe3cd2cdc4b53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/290-million-kelp-dao-crypto-heist-blamed-on-north--c8351c6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%24290%20Million%20Kelp%20DAO%20Crypto%20Heist%20Blamed%20on%20North%20Korea&amp;severity=medium&amp;id=69e74e6619fe3cd2cdc490b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39467-cwe-502-deserialization-of-untruste-b052f27b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39467%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20MetaSlider%20Responsive%20Slider%20by%20MetaSlider&amp;severity=high&amp;id=69e85dc119fe3cd2cd7080b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3317-cwe-79-improper-neutralization-of-in-bc0d6fff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3317%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Navigate%20Navigate%20CMS&amp;severity=medium&amp;id=69e77fa019fe3cd2cdd6c936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-day-local-privilege-escalation-exploit-7e8bc202</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero-Day%20Local%20Privilege%20Escalation%20Exploit&amp;severity=medium&amp;id=69e743d919fe3cd2cdbf5fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stepdrainer-maas-platform-targeting-multi-chain-cr-8e2c0d64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StepDrainer%20MaaS%20Platform%20Targeting%20Multi-Chain%20Crypto%20Wallets%20and%20NFT%20Assets&amp;severity=medium&amp;id=69e743d919fe3cd2cdbf5f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13826-cwe-20-improper-input-validation-in-e8122402</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13826%3A%20CWE-20%20Improper%20input%20validation%20in%20Zervit%20portable%20HTTP%2FWeb%20server&amp;severity=high&amp;id=69e7405619fe3cd2cdbc7e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-wav-with-a-payload-tue-apr-21st-23f911ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20.WAV%20With%20A%20Payload%2C%20(Tue%2C%20Apr%2021st)&amp;severity=medium&amp;id=69e7243619fe3cd2cdad0936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6711-cwe-79-improper-neutralization-of-in-36876d7f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ryhowa%20Website%20LLMs.txt&amp;severity=medium&amp;id=69e7244019fe3cd2cdad1062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6712-cwe-79-improper-neutralization-of-in-d4d456a7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6712%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ryhowa%20Website%20LLMs.txt&amp;severity=medium&amp;id=69e7244019fe3cd2cdad1066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6703-cwe-862-missing-authorization-in-cyb-07334513</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6703%3A%20CWE-862%20Missing%20Authorization%20in%20cyberchimps%20Responsive%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=69e7244019fe3cd2cdad1058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31368-vulnerability-in-honor-aiassistant-1df3a7cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31368%3A%20Vulnerability%20in%20Honor%20AIAssistant&amp;severity=high&amp;id=69e7244019fe3cd2cdad104e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31370-vulnerability-in-honor-honor-e-c66083f6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31370%3A%20Vulnerability%20in%20Honor%20Honor%20E&amp;severity=medium&amp;id=69e7244019fe3cd2cdad1055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31369-vulnerability-in-honor-pcmanager-613082f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31369%3A%20Vulnerability%20in%20Honor%20PcManager&amp;severity=low&amp;id=69e7244019fe3cd2cdad1052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5965-cwe-78-improper-neutralization-of-sp-2ef8e92f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5965%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20NewSoft%20NewSoftOA&amp;severity=critical&amp;id=69e6f68219fe3cd2cd7b7460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6674-cwe-89-improper-neutralization-of-sp-bfb6e268</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6674%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tholstkabelbwde%20Plugin%3A%20CMS%20f%C3%BCr%20Motorrad%20Werkst%C3%A4tten&amp;severity=medium&amp;id=69e6e4ee19fe3cd2cd6b0ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6675-cwe-20-improper-input-validation-in--4090eec6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6675%3A%20CWE-20%20Improper%20Input%20Validation%20in%20cyberchimps%20Responsive%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=69e6e4ee19fe3cd2cd6b0eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-clickfix-campaign-applescript-stealers-new-t-be54c1be</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS%20ClickFix%20Campaign%3A%20AppleScript%20Stealers%20%26%20New%20Terminal%20Protections&amp;severity=medium&amp;id=69e743d919fe3cd2cdbf5f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-21st-2026-httpsisc-777f2247</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%2021st%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9900%2C%20(Tue%2C%20Apr%2021st)&amp;severity=medium&amp;id=69e6da6219fe3cd2cd678755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40497-cwe-79-improper-neutralization-of-i-2ec0f6d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40497%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e6e4ee19fe3cd2cd6b0ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6058-cwe-116-improper-encoding-or-escapin-11e72fb4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6058%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Zyxel%20WRE6505%20v2%20firmware&amp;severity=medium&amp;id=69e6d6dd19fe3cd2cd64f73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40496-cwe-330-use-of-insufficiently-rando-3f3ecc92</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40496%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39973-cwe-22-improper-limitation-of-a-pat-c6436e92</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39973%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iBotPeaches%20Apktool&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40250-cwe-190-integer-overflow-or-wraparo-2b457c47</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40250%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40244-cwe-190-integer-overflow-or-wraparo-b0178a70</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40244%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39886-cwe-190-integer-overflow-or-wraparo-340b0101</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39886%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69e6d6dd19fe3cd2cd64f723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39866-cwe-77-improper-neutralization-of-s-81df236e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39866%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20LawnchairLauncher%20lawnchair&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39861-cwe-22-improper-limitation-of-a-pat-fe7bb571</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39861%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69e70c3119fe3cd2cda1991b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39386-cwe-20-improper-input-validation-in-3dff969c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39386%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20m1k1o%20neko&amp;severity=high&amp;id=69e70c3119fe3cd2cda19916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39378-cwe-22-improper-limitation-of-a-pat-8ec9e358</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39378%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jupyter%20nbconvert&amp;severity=medium&amp;id=69e70c3119fe3cd2cda19912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39377-cwe-22-improper-limitation-of-a-pat-ab7b12da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39377%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jupyter%20nbconvert&amp;severity=medium&amp;id=69e70c3119fe3cd2cda1990e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39320-cwe-400-uncontrolled-resource-consu-192a946e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39320%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20SignalK%20signalk-server&amp;severity=high&amp;id=69e70c3119fe3cd2cda19908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-22-81c87d26</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-22&amp;severity=medium&amp;id=69e95b5c87115cfb68e9a40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-21-bc5489f3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-21&amp;severity=medium&amp;id=69e8133c19fe3cd2cd08e488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41527-cwe-670-always-incorrect-control-fl-d691b0ff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41527%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20KDE%20Kleopatra&amp;severity=medium&amp;id=69e7f01d19fe3cd2cdfcab50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40706-cwe-122-heap-based-buffer-overflow--1677622f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40706%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Tuxera%20NTFS-3G&amp;severity=high&amp;id=69e7e91619fe3cd2cdfaec3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70420-na-4e0e2207</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70420%3A%20n%2Fa&amp;severity=high&amp;id=69e7e59b19fe3cd2cdf9f604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38835-na-76ac3533</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38835%3A%20n%2Fa&amp;severity=critical&amp;id=69e7b0e319fe3cd2cde9a45c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38834-na-8ec8315b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38834%3A%20n%2Fa&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30452-na-063586c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30452%3A%20n%2Fa&amp;severity=medium&amp;id=69e7a9cf19fe3cd2cde6d340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37748-na-307786c0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37748%3A%20n%2Fa&amp;severity=high&amp;id=69e79f4219fe3cd2cde23986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31019-na-95fdcbf8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31019%3A%20n%2Fa&amp;severity=high&amp;id=69e7913319fe3cd2cddd42fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31014-na-5cd81c30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31014%3A%20n%2Fa&amp;severity=medium&amp;id=69e7913319fe3cd2cddd42fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31013-na-1bff2a7e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31013%3A%20n%2Fa&amp;severity=medium&amp;id=69e7913319fe3cd2cddd42f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31018-na-5cedfc61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31018%3A%20n%2Fa&amp;severity=high&amp;id=69e78a2b19fe3cd2cdda97f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29644-na-9220de1b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29644%3A%20n%2Fa&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-21-67550afc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-21&amp;severity=low&amp;id=69e720a919fe3cd2cdab8fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35570-cwe-22-improper-limitation-of-a-pat-9690475b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35570%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Gitlawb%20openclaude&amp;severity=high&amp;id=69e6b73b19fe3cd2cd3f2d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35588-cwe-89-improper-neutralization-of-s-d5dd4191</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35588%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=medium&amp;id=69e6b73b19fe3cd2cd3f2d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35587-cwe-918-server-side-request-forgery-b45389c5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35587%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69e6b73b19fe3cd2cd3f2d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34839-cwe-200-exposure-of-sensitive-infor-610ff57b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34839%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69e6b73b19fe3cd2cd3f2d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34082-cwe-863-incorrect-authorization-in--40639301</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34082%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20langgenius%20dify&amp;severity=medium&amp;id=69e6b3b619fe3cd2cd3c6984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5721-cwe-79-improper-neutralization-of-in-22e6e920</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdatatables%20wpDataTables%20%E2%80%93%20WordPress%20Data%20Table%2C%20Dynamic%20Tables%20%26%20Table%20Charts%20Plugin&amp;severity=medium&amp;id=69e70c3119fe3cd2cda1991e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6729-improper-authentication-cwe-287-in-h-9f443589</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6729%3A%20Improper%20Authentication%20(CWE-287)%20in%20HKUDS%20OpenHarness&amp;severity=medium&amp;id=69e6a5a619fe3cd2cd37e7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0930-cwe-126-buffer-over-read-in-wolfssl--45e6df06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0930%3A%20CWE-126%20Buffer%20over-read%20in%20wolfSSL%20wolfSSH&amp;severity=low&amp;id=69e69e9e19fe3cd2cd35b3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22051-213-in-netapp-storagegrid-formerly--21cb3eaf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22051%3A%20213%20in%20NETAPP%20StorageGRID%20(formerly%20StorageGRID%20Webscale)&amp;severity=low&amp;id=69e69e9e19fe3cd2cd35b3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5450-cwe-122-heap-based-buffer-overflow-i-519d630a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5450%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=critical&amp;id=69e6941f19fe3cd2cd32c4a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5928-cwe-127-buffer-under-read-in-the-gnu-718b9b46</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5928%3A%20CWE-127%20Buffer%20under-read%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69e6942119fe3cd2cd32c4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5358-cwe-120-buffer-copy-without-checking-f66644ca</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5358&amp;severity=null&amp;id=69e6941f19fe3cd2cd32c49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-oauth-device-code-flow-47c06045</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20OAuth%20Device%20Code%20Flow&amp;severity=medium&amp;id=69e743d919fe3cd2cdbf5f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33626-cwe-918-server-side-request-forgery-8b34f83e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33626%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20InternLM%20lmdeploy&amp;severity=high&amp;id=69e6941f19fe3cd2cd32c48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4852-cwe-79-improper-neutralization-of-in-a8bf03ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4852%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webzunft%20Image%20Source%20Control%20Lite%20%E2%80%93%20Show%20Image%20Credits%20and%20Captions&amp;severity=medium&amp;id=69e6941f19fe3cd2cd32c499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34403-cwe-1385-missing-origin-validation--246430aa</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34403%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69e6941f19fe3cd2cd32c495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33031-cwe-284-improper-access-control-in--72cf9b52</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33031%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69e6941f19fe3cd2cd32c48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6249-cwe-434-unrestricted-upload-of-file--37387f6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6249%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Vvveb%20Vvveb%20CMS&amp;severity=high&amp;id=69e6860319fe3cd2cd2e53c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32311-cwe-78-improper-neutralization-of-s-db639b7a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32311%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20reconurge%20flowsint&amp;severity=critical&amp;id=69e6860319fe3cd2cd2e53c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5478-cwe-22-improper-limitation-of-a-path-efdce342</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5478%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%2C%20Quiz%2C%20Survey%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=69e6827f19fe3cd2cd2c9b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6550-cwe-757-selection-of-less-secure-alg-f7428a18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6550%3A%20CWE-757%20Selection%20of%20Less-Secure%20algorithm%20during%20negotiation%20(&apos;algorithm%20downgrade&apos;)%20in%20AWS%20AWS%20Encryption%20SDK%20for%20Python&amp;severity=medium&amp;id=69e6827f19fe3cd2cd2c9b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6257-cwe-434-unrestricted-upload-of-file--a5467518</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6257%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Vvveb%20Vvveb%20CMS&amp;severity=critical&amp;id=69e6827f19fe3cd2cd2c9b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6248-cwe-22-improper-limitation-of-a-path-6a56cf6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6248%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=69e6746e19fe3cd2cd270d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6060-cwe-400-uncontrolled-resource-consum-095d4529</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6060%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20OTRS%20AG%20OTRS&amp;severity=medium&amp;id=69e6746e19fe3cd2cd270d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23753-cwe-79-improper-neutralization-of-i-e0904d43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e669e219fe3cd2cd1fdd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23752-cwe-79-improper-neutralization-of-i-bc58662f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e669e219fe3cd2cd1fdd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23756-cwe-79-improper-neutralization-of-i-3fda2202</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e6665f19fe3cd2cd1d0af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23758-cwe-79-improper-neutralization-of-i-2b15cc21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23758%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e6665f19fe3cd2cd1d0af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23757-cwe-79-improper-neutralization-of-i-cb7aff71</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e669e219fe3cd2cd1fdd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6662-permissive-cross-domain-policy-with--ecf1bf74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6662%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20ericc-ch%20copilot-api&amp;severity=medium&amp;id=69e65f5619fe3cd2cd181516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35154-cwe-269-improper-privilege-manageme-1398659d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35154%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20PowerProtect%20Data%20Domain%20appliances&amp;severity=medium&amp;id=69e65f5619fe3cd2cd181513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26951-cwe-121-stack-based-buffer-overflow-b7d3a9fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26951%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e65f5619fe3cd2cd18150b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22761-cwe-78-improper-neutralization-of-s-276732a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22761%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e65f5619fe3cd2cd181508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26942-cwe-78-improper-neutralization-of-s-0c3802de</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26942%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e6585319fe3cd2cd13fc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26943-cwe-78-improper-neutralization-of-s-e6401189</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26943%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28684-cwe-59-improper-link-resolution-bef-53f39769</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28684%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20theskumar%20python-dotenv&amp;severity=medium&amp;id=69e6585319fe3cd2cd13fc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40488-cwe-434-unrestricted-upload-of-file-92009658</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40488%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20OpenMage%20magento-lts&amp;severity=high&amp;id=69e6585619fe3cd2cd13fdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24506-cwe-78-improper-neutralization-of-s-6ab75aac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24506%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40098-cwe-862-missing-authorization-in-op-fd04dcee</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40098%3A%20CWE-862%3A%20Missing%20Authorization%20in%20OpenMage%20magento-lts&amp;severity=medium&amp;id=69e6585619fe3cd2cd13fde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41445-cwe-190-integer-overflow-or-wraparo-01c0a012</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41445%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20mborgerding%20kissfft&amp;severity=high&amp;id=69e6585619fe3cd2cd13fdef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24505-cwe-20-improper-input-validation-in-c6a9ba55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24505%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25525-cwe-22-improper-limitation-of-a-pat-a9976697</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25525%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenMage%20magento-lts&amp;severity=medium&amp;id=69e6585319fe3cd2cd13fc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25524-cwe-502-deserialization-of-untruste-3dde7b9a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25524%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20OpenMage%20magento-lts&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24504-cwe-20-improper-input-validation-in-aaecaf65</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24504%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25883-cwe-918-server-side-request-forgery-e4d85caa</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25883%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Vexa-ai%20vexa&amp;severity=medium&amp;id=69e6514819fe3cd2cd0f546a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25058-cwe-306-missing-authentication-for--43e38c98</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25058%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vexa-ai%20vexa&amp;severity=high&amp;id=69e6514819fe3cd2cd0f5467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23774-cwe-78-improper-neutralization-of-s-21982f3d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23774%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6514819fe3cd2cd0f5458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26944-cwe-306-missing-authentication-for--b54222f7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26944%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6514819fe3cd2cd0f546d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24468-cwe-204-observable-response-discrep-14e76056</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24468%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20OpenAEV-Platform%20openaev&amp;severity=medium&amp;id=69e6514819fe3cd2cd0f5461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/serial-to-ip-converter-flaws-expose-ot-and-healthc-418cd40b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Serial-to-IP%20Converter%20Flaws%20Expose%20OT%20and%20Healthcare%20Systems%20to%20Hacking&amp;severity=medium&amp;id=69e64a3d19fe3cd2cd0b92f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24467-cwe-640-weak-password-recovery-mech-f6c2c6a1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24467%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20OpenAEV-Platform%20openaev&amp;severity=critical&amp;id=69e6514819fe3cd2cd0f545b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6066-cwe-319-cleartext-transmission-of-se-33382bd5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6066%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20ConnectWise%20Automate&amp;severity=high&amp;id=69e64a4819fe3cd2cd0b9550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40896-cwe-367-time-of-check-time-of-use-t-00e246fb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40896%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20opf%20openproject&amp;severity=medium&amp;id=69e64a4819fe3cd2cd0b954c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-gentlemen-systembc-a-sneak-peek-behind-the-pro-8855cd3b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Gentlemen%20%26%20SystemBC%3A%20A%20Sneak%20Peek%20Behind%20the%20Proxy&amp;severity=medium&amp;id=69e654cd19fe3cd2cd11382a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6652-improper-neutralization-of-directive-fc5b0bb7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6652%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20Pagekit%20CMS&amp;severity=medium&amp;id=69e6433a19fe3cd2cd0895a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3219-vulnerability-in-python-packaging-au-c2c2a79a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3219%3A%20Vulnerability%20in%20Python%20Packaging%20Authority%20pip&amp;severity=medium&amp;id=69e6433a19fe3cd2cd089595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39918-cwe-94-improper-control-of-generati-40adcadb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39918%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20givanz%20Vvveb&amp;severity=critical&amp;id=69e6433a19fe3cd2cd089590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6651-cross-site-scripting-in-erponlinexyz-2be03bc3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6651%3A%20Cross%20Site%20Scripting%20in%20erponline.xyz%20ERP%20Online&amp;severity=medium&amp;id=69e6433a19fe3cd2cd08959e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6650-unrestricted-upload-in-z-blogphp-5877ecba</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6650%3A%20Unrestricted%20Upload%20in%20Z-BlogPHP&amp;severity=medium&amp;id=69e6433a19fe3cd2cd089598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/20th-april-threat-intelligence-report-cca5eb65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=20th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69e7196619fe3cd2cda7fa5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34428-cwe-918-server-side-request-forgery-d80a5e6f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34428%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20givanz%20Vvveb&amp;severity=high&amp;id=69e6390b19fe3cd2cd032865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34427-cwe-915-improperly-controlled-modif-93e46d07</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34427%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20givanz%20Vvveb&amp;severity=high&amp;id=69e6390b19fe3cd2cd032860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34429-cwe-79-improper-neutralization-of-i-98ae1cc2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=69e6390b19fe3cd2cd03286a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6369-cwe-306-missing-authentication-for-c-433fed26</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6369%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Canonical%20canonical-livepatch&amp;severity=medium&amp;id=69e631a519fe3cd2cdff2615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4048-cwe-77-in-progress-software-loadmast-147ff8ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4048%3A%20CWE-77%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=69e631a519fe3cd2cdff2612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3519-cwe-77-in-progress-software-loadmast-bb82ec04</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3519%3A%20CWE-77%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=69e631a519fe3cd2cdff260f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6649-server-side-request-forgery-in-qibo--08a5f1b3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6649%3A%20Server-Side%20Request%20Forgery%20in%20Qibo%20CMS&amp;severity=medium&amp;id=69e631a519fe3cd2cdff2618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3518-cwe-77-in-progress-software-loadmast-bd0fbf2f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3518%3A%20CWE-77%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=69e631a519fe3cd2cdff260c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33557-cwe-1285-improper-validation-of-spe-1e576c60</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33557%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Apache%20Software%20Foundation%20Apache%20Kafka&amp;severity=critical&amp;id=69e631a519fe3cd2cdff25ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66335-cwe-89-improper-neutralization-of-s-9d5744c2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66335%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Doris%20MCP%20Server&amp;severity=medium&amp;id=69e631a519fe3cd2cdff25fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3517-cwe-77-in-progress-software-loadmast-5d7a71cc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3517%3A%20CWE-77%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=69e631a519fe3cd2cdff2609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33558-cwe-533-deprecated-information-expo-cc938213</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33558%3A%20CWE-533%20DEPRECATED%3A%20Information%20Exposure%20Through%20Server%20Log%20Files%20in%20Apache%20Software%20Foundation%20Apache%20Kafka&amp;severity=medium&amp;id=69e631a519fe3cd2cdff2604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flowerstorm-phishing-kit-targeting-microsoft-crede-9e17756a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FlowerStorm%20Phishing%20Kit%20Targeting%20Microsoft%20Credentials%20via%20Cloudflare-Backed%20Infrastructure&amp;severity=medium&amp;id=69e62e1d19fe3cd2cdfced09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6648-cross-site-scripting-in-qibo-cms-269e177a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6648%3A%20Cross%20Site%20Scripting%20in%20Qibo%20CMS&amp;severity=medium&amp;id=69e6271719fe3cd2cdf8df91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dfir-report-the-gentlemen-systembc-a-sneak-peek-be-e15f14f2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DFIR%20Report%20%E2%80%93%20The%20Gentlemen%20%26%20SystemBC%3A%20A%20Sneak%20Peek%20Behind%20the%20Proxy&amp;severity=medium&amp;id=69e7196619fe3cd2cda7fa61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/british-scattered-spider-hacker-pleads-guilty-in-t-e1fa3b76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=British%20Scattered%20Spider%20Hacker%20Pleads%20Guilty%20in%20the%20US&amp;severity=medium&amp;id=69e61c8a19fe3cd2cdefb19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6636-path-traversal-in-p2r3-convert-d00184c9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6636%3A%20Path%20Traversal%20in%20p2r3%20convert&amp;severity=medium&amp;id=69e6190619fe3cd2cdecc9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5958-cwe-367-time-of-check-time-of-use-to-e65de13f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5958%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20GNU%20Sed&amp;severity=low&amp;id=69e6190619fe3cd2cdecc9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6635-improper-authentication-in-rowboatla-9b05aca8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6635%3A%20Improper%20Authentication%20in%20rowboatlabs%20rowboat&amp;severity=medium&amp;id=69e631a719fe3cd2cdff2662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-qemu-for-defense-evasion-673cbf51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Abuse%20QEMU%20for%20Defense%20Evasion&amp;severity=medium&amp;id=69e611fe19fe3cd2cde6140f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6634-improper-authorization-in-usememos-m-7b131960</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6634%3A%20Improper%20Authorization%20in%20usememos%20memos&amp;severity=medium&amp;id=69e64a4819fe3cd2cd0b9562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6633-cross-site-scripting-in-yifang-cms-e0555989</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6633%3A%20Cross%20Site%20Scripting%20in%20Yifang%20CMS&amp;severity=medium&amp;id=69e6271719fe3cd2cdf8df97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bluesky-disrupted-by-sophisticated-ddos-attack-2013c9dd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bluesky%20Disrupted%20by%20Sophisticated%20DDoS%20Attack&amp;severity=medium&amp;id=69e60af619fe3cd2cde01c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6632-buffer-overflow-in-tenda-f451-bee9b5ea</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6632%3A%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69e60aff19fe3cd2cde02e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6631-buffer-overflow-in-tenda-f451-8a352ca6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6631%3A%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69e60aff19fe3cd2cde02e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/senate-extends-surveillance-powers-until-april-30--2b6753d8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Senate%20Extends%20Surveillance%20Powers%20Until%20April%2030%20After%20Chaotic%20Votes%20in%20House&amp;severity=medium&amp;id=69e603ee19fe3cd2cdd9697f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6630-buffer-overflow-in-tenda-f451-1cedec4e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6630%3A%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69e603f619fe3cd2cdd9a5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fakewallet-crypto-stealer-spreading-in-the-app-sto-5237263b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FakeWallet%20crypto%20stealer%20spreading%20in%20the%20App%20Store&amp;severity=medium&amp;id=69e60e8319fe3cd2cde3130b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6629-sql-injection-in-metasoft-metacrm-f3e54b0d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6629%3A%20SQL%20Injection%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=69e603f619fe3cd2cdd9a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6654-vulnerability-in-mozilla-thin-vec-bd2ecbfa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6654%3A%20Vulnerability%20in%20Mozilla%20thin-vec&amp;severity=medium&amp;id=69e603f619fe3cd2cdd9a5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6628-sql-injection-in-phili67-ecclesia-cr-e229716e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6628%3A%20SQL%20Injection%20in%20phili67%20Ecclesia%20CRM&amp;severity=medium&amp;id=69e5fce519fe3cd2cdd0602e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6626-improper-neutralization-of-special-e-f2e20b81</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6626%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Cockpit-HQ%20Cockpit&amp;severity=medium&amp;id=69e5fce519fe3cd2cdd06028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/half-of-the-6-million-internet-facing-ftp-servers--79509a68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Half%20of%20the%206%20Million%20Internet-Facing%20FTP%20Servers%20Lack%20Encryption&amp;severity=medium&amp;id=69e5f5de19fe3cd2cdc89678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6625-server-side-request-forgery-in-moxi6-e3814803</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6625%3A%20Server-Side%20Request%20Forgery%20in%20moxi624%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=69e5fce519fe3cd2cdd06022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6624-cross-site-scripting-in-bichitrogan--354d0f6e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6624%3A%20Cross%20Site%20Scripting%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69e5f25919fe3cd2cdc4c104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6623-cross-site-scripting-in-bichitrogan--8ea58ada</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6623%3A%20Cross%20Site%20Scripting%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69e5f25919fe3cd2cdc4c0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13480-cwe-863-incorrect-authorization-in--3f01e592</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13480%3A%20CWE-863%20Incorrect%20Authorization%20in%20Fudo%20Security%20Fudo%20Enterprise&amp;severity=medium&amp;id=69e5f25919fe3cd2cdc4c0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6622-cross-site-scripting-in-bichitrogan--c25daae2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6622%3A%20Cross%20Site%20Scripting%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69e5f25919fe3cd2cdc4c0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6621-improperly-controlled-modification-o-7c91d3f8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6621%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%201024bit%20extend-deep&amp;severity=medium&amp;id=69e64a4819fe3cd2cd0b955c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nextjs-creator-vercel-hacked-e4246dae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Next.js%20Creator%20Vercel%20Hacked&amp;severity=medium&amp;id=69e5e44a19fe3cd2cdb517b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6620-path-traversal-in-soniccloudorg-soni-febe8664</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6620%3A%20Path%20Traversal%20in%20SonicCloudOrg%20sonic-server&amp;severity=medium&amp;id=69e64a4819fe3cd2cd0b9556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39454-incorrect-default-permissions-in-sk-929f8394</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39454%3A%20Incorrect%20default%20permissions%20in%20Sky%20Co.%2CLTD.%20SKYSEA%20Client%20View&amp;severity=high&amp;id=69e631a519fe3cd2cdff261e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6619-cross-site-scripting-in-langgenius-d-65fd59e1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6619%3A%20Cross%20Site%20Scripting%20in%20langgenius%20dify&amp;severity=medium&amp;id=69e631a719fe3cd2cdff265c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-fail-to-exploit-flaw-in-discontinued-tp-li-e1fa8e2a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Fail%20to%20Exploit%20Flaw%20in%20Discontinued%20TP-Link%20Routers&amp;severity=medium&amp;id=69e5dd5619fe3cd2cdad2cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6618-server-side-request-forgery-in-langg-3b12c24f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6618%3A%20Server-Side%20Request%20Forgery%20in%20langgenius%20dify&amp;severity=medium&amp;id=69e6585619fe3cd2cd13fdf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5967-cwe-78-improper-neutralization-of-sp-375a9a75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5967%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TeamT5%20ThreatSonar%20Anti-Ransomware&amp;severity=high&amp;id=69e631a719fe3cd2cdff2658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5966-cwe-23-relative-path-traversal-in-te-c8f3e690</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5966%3A%20CWE-23%20Relative%20path%20traversal%20in%20TeamT5%20ThreatSonar%20Anti-Ransomware&amp;severity=high&amp;id=69e5d9d119fe3cd2cda9cb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5964-cwe-89-improper-neutralization-of-sp-398bc6f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5964%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Digiwin%20EasyFlow%20.NET&amp;severity=critical&amp;id=69e5d9d119fe3cd2cda9cb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5963-cwe-89-improper-neutralization-of-sp-69f9977c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5963%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Digiwin%20EasyFlow%20.NET&amp;severity=critical&amp;id=69e5d9d119fe3cd2cda9cb39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6617-server-side-request-forgery-in-langg-75bf2804</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6617%3A%20Server-Side%20Request%20Forgery%20in%20langgenius%20dify&amp;severity=medium&amp;id=69e5d9d119fe3cd2cda9cb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6616-server-side-request-forgery-in-trans-20d98e02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6616%3A%20Server-Side%20Request%20Forgery%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5d9d119fe3cd2cda9cb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41282-cwe-94-improper-control-of-generati-446e408b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41282%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ProjectDiscovery%20Nuclei&amp;severity=medium&amp;id=69e5d9d119fe3cd2cda9cb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6615-path-traversal-in-transformeroptimus-9ba57721</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6615%3A%20Path%20Traversal%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5d9d119fe3cd2cda9cb45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6644-cwe-78-improper-neutralization-of-sp-fee0276d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6644%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20ASUSTOR%20Inc.%20ADM&amp;severity=critical&amp;id=69e5cf3219fe3cd2cda1169c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6614-authorization-bypass-in-transformero-c24b9dcf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6614%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5cf3219fe3cd2cda11693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/handling-the-cve-flood-with-epss-mon-apr-20th-3cd777cb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Handling%20the%20CVE%20Flood%20With%20EPSS%2C%20(Mon%2C%20Apr%2020th)&amp;severity=medium&amp;id=69e5cbad19fe3cd2cd9ed738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6643-cwe-121-stack-based-buffer-overflow--b118ebfd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6643%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20ASUSTOR%20Inc.%20ADM&amp;severity=high&amp;id=69e5cf3219fe3cd2cda11699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6613-authorization-bypass-in-transformero-89a74328</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6613%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5cf3219fe3cd2cda1168d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6612-authorization-bypass-in-transformero-9d91632f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6612%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5cf3219fe3cd2cda11687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6611-use-of-hard-coded-cryptographic-key--a0a79e86</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6611%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20liangliangyy%20DjangoBlog&amp;severity=low&amp;id=69e5cf3219fe3cd2cda11681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7083-cwe-79-cross-site-scripting-xss-in-e-63ce6c06</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7083%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Email%20Encoder&amp;severity=low&amp;id=69e5cf3219fe3cd2cda1167e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6610-hard-coded-credentials-in-liangliang-a2b730a6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6610%3A%20Hard-coded%20Credentials%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5c14919fe3cd2cd962e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6609-improper-authorization-in-liangliang-a15a7437</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6609%3A%20Improper%20Authorization%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5c14919fe3cd2cd962e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6608-incorrect-control-flow-in-lm-sys-fas-aa6c9d8b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6608%3A%20Incorrect%20Control%20Flow%20in%20lm-sys%20fastchat&amp;severity=medium&amp;id=69e5c14919fe3cd2cd962e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6607-resource-consumption-in-lm-sys-fastc-4da4a4dc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6607%3A%20Resource%20Consumption%20in%20lm-sys%20fastchat&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e69b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6606-server-side-request-forgery-in-model-695ac09a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6606%3A%20Server-Side%20Request%20Forgery%20in%20modelscope%20agentscope&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e69b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6605-server-side-request-forgery-in-model-6fb273db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6605%3A%20Server-Side%20Request%20Forgery%20in%20modelscope%20agentscope&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e69aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6604-server-side-request-forgery-in-model-881679f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6604%3A%20Server-Side%20Request%20Forgery%20in%20modelscope%20agentscope&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e69a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6603-code-injection-in-modelscope-agentsc-3170df70</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6603%3A%20Code%20Injection%20in%20modelscope%20agentscope&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e699b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6602-unrestricted-upload-in-rickxy-hospit-45f45410</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6602%3A%20Unrestricted%20Upload%20in%20rickxy%20Hospital%20Management%20System&amp;severity=medium&amp;id=69e5a50519fe3cd2cd673708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6601-resource-consumption-in-lagom-whmcs--f4276070</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6601%3A%20Resource%20Consumption%20in%20Lagom%20WHMCS%20Template&amp;severity=medium&amp;id=69e5a50519fe3cd2cd673702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32956-heap-based-buffer-overflow-in-silex-2da79db9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32956%3A%20Heap-based%20buffer%20overflow%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=critical&amp;id=69e5a50219fe3cd2cd673633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32955-stack-based-buffer-overflow-in-sile-b2529213</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32955%3A%20Stack-based%20buffer%20overflow%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=high&amp;id=69e5a50219fe3cd2cd67362c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32957-missing-authentication-for-critical-9dcf34bb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32957%3A%20Missing%20authentication%20for%20critical%20function%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32958-use-of-hard-coded-cryptographic-key-805cec1d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32958%3A%20Use%20of%20hard-coded%20cryptographic%20key%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32959-use-of-a-broken-or-risky-cryptograp-82a33d15</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32959%3A%20Use%20of%20a%20broken%20or%20risky%20cryptographic%20algorithm%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32960-sensitive-information-in-resource-n-8d82b9fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32960%3A%20Sensitive%20information%20in%20resource%20not%20removed%20before%20reuse%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd67365c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32961-heap-based-buffer-overflow-in-silex-cb51ce4d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32961%3A%20Heap-based%20buffer%20overflow%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32962-missing-authentication-for-critical-c133ad14</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32962%3A%20Missing%20authentication%20for%20critical%20function%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32963-cross-site-scripting-xss-in-silex-t-81271128</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32963%3A%20Cross-site%20scripting%20(XSS)%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd67366b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32964-improper-neutralization-of-crlf-seq-0a04f4b8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32964%3A%20Improper%20neutralization%20of%20CRLF%20sequences%20(&apos;CRLF%20Injection&apos;)%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32965-initialization-of-a-resource-with-a-addb8b09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32965%3A%20Initialization%20of%20a%20resource%20with%20an%20insecure%20default%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=high&amp;id=69e5a50519fe3cd2cd6736eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6600-cross-site-scripting-in-langflow-ai--78b00a64</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6600%3A%20Cross%20Site%20Scripting%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5a50519fe3cd2cd6736fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6599-injection-in-langflow-ai-langflow-bac58919</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6599%3A%20Injection%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5a50519fe3cd2cd6736f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6598-cleartext-storage-in-a-file-or-on-di-48f0305d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6598%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5a50519fe3cd2cd6736f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6597-unprotected-storage-of-credentials-i-fc1cbce7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6597%3A%20Unprotected%20Storage%20of%20Credentials%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5936f19fe3cd2cd4fde16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6596-unrestricted-upload-in-langflow-ai-l-b4176c6e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6596%3A%20Unrestricted%20Upload%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5936f19fe3cd2cd4fde10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6595-sql-injection-in-projectsandprograms-5088e0c9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6595%3A%20SQL%20Injection%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=69e5936f19fe3cd2cd4fde0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-april-20th-2026-httpsiscs-97618251</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20April%2020th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9898%2C%20(Mon%2C%20Apr%2020th)&amp;severity=medium&amp;id=69e588e319fe3cd2cd49d321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6594-improperly-controlled-modification-o-3776681f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6594%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20brikcss%20merge&amp;severity=medium&amp;id=69e5badb19fe3cd2cd92727a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6593-cross-site-scripting-in-comfyui-b35dbf78</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6593%3A%20Cross%20Site%20Scripting%20in%20ComfyUI&amp;severity=medium&amp;id=69e5badb19fe3cd2cd927274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6592-cross-site-scripting-in-comfyui-80457360</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6592%3A%20Cross%20Site%20Scripting%20in%20ComfyUI&amp;severity=medium&amp;id=69e5badb19fe3cd2cd92726e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6591-path-traversal-in-comfyui-480d807d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6591%3A%20Path%20Traversal%20in%20ComfyUI&amp;severity=medium&amp;id=69e57e5719fe3cd2cd43e17a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6590-path-traversal-in-comfyui-c208732b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6590%3A%20Path%20Traversal%20in%20ComfyUI&amp;severity=medium&amp;id=69e57e5719fe3cd2cd43e174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6589-cross-site-request-forgery-in-comfyu-7a448fff</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6589%3A%20Cross-Site%20Request%20Forgery%20in%20ComfyUI&amp;severity=medium&amp;id=69e57e5719fe3cd2cd43e16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6588-missing-authentication-in-serge-chat-2fbbea1e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6588%3A%20Missing%20Authentication%20in%20serge-chat%20serge&amp;severity=medium&amp;id=69e57e5719fe3cd2cd43e168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6587-server-side-request-forgery-in-vibra-e572bea3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6587%3A%20Server-Side%20Request%20Forgery%20in%20vibrantlabsai%20RAGAS&amp;severity=medium&amp;id=69e5704619fe3cd2cd3006c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-21-462c7584</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-21&amp;severity=medium&amp;id=69e720a919fe3cd2cdab8fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-20-e7e0f2d2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-20&amp;severity=medium&amp;id=69e6c1bc19fe3cd2cd41d874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41285-na-02530dbb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41285%3A%20n%2Fa&amp;severity=medium&amp;id=69e6b73b19fe3cd2cd3f2d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29643-na-27c40415</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29643%3A%20n%2Fa&amp;severity=high&amp;id=69e69e9e19fe3cd2cd35b3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29648-na-7f29b57d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29648%3A%20n%2Fa&amp;severity=high&amp;id=69e6941f19fe3cd2cd32c487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29647-na-52884ff4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29647%3A%20n%2Fa&amp;severity=medium&amp;id=69e6941f19fe3cd2cd32c482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29646-na-03a49919</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29646%3A%20n%2Fa&amp;severity=critical&amp;id=69e6941f19fe3cd2cd32c479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29642-na-9942bec8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29642%3A%20n%2Fa&amp;severity=high&amp;id=69e6941f19fe3cd2cd32c473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29649-na-3ea96a6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29649%3A%20n%2Fa&amp;severity=critical&amp;id=69e6860319fe3cd2cd2e53bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29645-na-31235a89</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29645%3A%20n%2Fa&amp;severity=high&amp;id=69e6827f19fe3cd2cd2c9b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39112-na-d492f597</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39112%3A%20n%2Fa&amp;severity=medium&amp;id=69e6665f19fe3cd2cd1d0b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39111-na-19ab1b65</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39111%3A%20n%2Fa&amp;severity=high&amp;id=69e6665f19fe3cd2cd1d0b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39110-na-e8d4396c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39110%3A%20n%2Fa&amp;severity=high&amp;id=69e6665f19fe3cd2cd1d0b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39109-na-15450aee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39109%3A%20n%2Fa&amp;severity=critical&amp;id=69e6665f19fe3cd2cd1d0b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26399-na-50a687f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26399%3A%20n%2Fa&amp;severity=medium&amp;id=69e6665f19fe3cd2cd1d0afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30266-na-35614bad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30266%3A%20n%2Fa&amp;severity=high&amp;id=69e65f5619fe3cd2cd18150e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30269-na-bedba322</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30269%3A%20n%2Fa&amp;severity=critical&amp;id=69e6585319fe3cd2cd13fc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66954-na-9252c01a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66954%3A%20n%2Fa&amp;severity=medium&amp;id=69e6585319fe3cd2cd13fc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-20-3025abad</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-20&amp;severity=low&amp;id=69e573c219fe3cd2cd351de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6586-authorization-bypass-in-transformero-53bfb267</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6586%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e56cc819fe3cd2cd2de213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6585-authorization-bypass-in-transformero-ce26c4a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6585%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5693e19fe3cd2cd2c6f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6584-authorization-bypass-in-transformero-6aead21f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6584%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e565b919fe3cd2cd2a8db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6583-authorization-bypass-in-transformero-c549fd31</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6583%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5624119fe3cd2cd287964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6582-missing-authentication-in-transforme-149e0106</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6582%3A%20Missing%20Authentication%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e55ec119fe3cd2cd267291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6581-buffer-overflow-in-h3c-magic-b1-6a61fe35</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6581%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69e55b2e19fe3cd2cd24f831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6580-use-of-hard-coded-cryptographic-key--825a2bad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6580%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e557a919fe3cd2cd19a331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6579-missing-authentication-in-liangliang-d5252b3e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6579%3A%20Missing%20Authentication%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5542619fe3cd2cd0cb4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6578-hard-coded-credentials-in-liangliang-58ec81a5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6578%3A%20Hard-coded%20Credentials%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5499d19fe3cd2cde78631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6577-missing-authentication-in-liangliang-d57330cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6577%3A%20Missing%20Authentication%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5badb19fe3cd2cd927280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6576-command-injection-in-liangliangyy-dj-9d686e18</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6576%3A%20Command%20Injection%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e529f619fe3cd2cd68c633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6574-hard-coded-credentials-in-osuuu-ligh-b66f67a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6574%3A%20Hard-coded%20Credentials%20in%20osuuu%20LightPicture&amp;severity=medium&amp;id=69e4dc9d19fe3cd2cd590f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6573-server-side-request-forgery-in-phpem-e98897b9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6573%3A%20Server-Side%20Request%20Forgery%20in%20PHPEMS&amp;severity=medium&amp;id=69e4d59519fe3cd2cd54e679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6572-improper-authorization-in-collabora--c07f449a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6572%3A%20Improper%20Authorization%20in%20Collabora%20KodExplorer&amp;severity=medium&amp;id=69e4cb0a19fe3cd2cd4ea455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6571-authorization-bypass-in-kodcloud-kod-e6ff1cbb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6571%3A%20Authorization%20Bypass%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=69e4c78619fe3cd2cd4d1d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6570-authorization-bypass-in-kodcloud-kod-786c22b7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6570%3A%20Authorization%20Bypass%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=69e4bcf919fe3cd2cd48691d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6569-improper-authentication-in-kodcloud--0db7b657</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6569%3A%20Improper%20Authentication%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=69e4aee819fe3cd2cd406c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6568-path-traversal-in-kodcloud-kodexplor-1b477f95</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6568%3A%20Path%20Traversal%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=69e4ab6519fe3cd2cd3e5cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6564-improper-authorization-in-emq-emqx-e-50d714fd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6564%3A%20Improper%20Authorization%20in%20EMQ%20EMQX%20Enterprise&amp;severity=medium&amp;id=69e4a45d19fe3cd2cd38c81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6563-buffer-overflow-in-h3c-magic-b1-2ad2f98e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6563%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69e4964d19fe3cd2cd310932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6562-sql-injection-in-dameng100-muucmf-c09ef714</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6562%3A%20SQL%20Injection%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69e4964d19fe3cd2cd31092c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6561-unrestricted-upload-in-eyoucms-280f408b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6561%3A%20Unrestricted%20Upload%20in%20EyouCMS&amp;severity=medium&amp;id=69e484bd19fe3cd2cd25f971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6560-buffer-overflow-in-h3c-magic-b0-f38a59da</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6560%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B0&amp;severity=high&amp;id=69e47db819fe3cd2cd0ae874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6559-cross-site-scripting-in-wavlink-wl-w-3f20100a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6559%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69e46c1d19fe3cd2cde78368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0868-cwe-79-improper-neutralization-of-in-3458e49a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20turn2honey%20EMC%20%E2%80%93%20Easily%20Embed%20Calendly%20Scheduling&amp;severity=medium&amp;id=69e45526bdfbbecc5954aa8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-20-d4ceb546</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-20&amp;severity=medium&amp;id=69e6006119fe3cd2cdd3a36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-19-f8492fcf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-19&amp;severity=medium&amp;id=69e5703c19fe3cd2cd2fe55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-19-e2614695</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-19&amp;severity=low&amp;id=69e4551ebdfbbecc5954a64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41242-cwe-94-improper-control-of-generati-3ca40985</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41242%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20protobufjs%20protobuf.js&amp;severity=critical&amp;id=69e46a7a19fe3cd2cde33d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-phantomclr-stealth-execution-via-appdoma-bca267b0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20PhantomCLR%3A%20Stealth%20Execution%20via%20AppDomain%20Hijacking%20and%20In-Memory%20.NET%20Abuse&amp;severity=medium&amp;id=69e603f419fe3cd2cdd9a2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40948-cwe-352-cross-site-request-forgery--1d13b30e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40948%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Keycloak&amp;severity=medium&amp;id=69e38cc4bdfbbecc5977d883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2986-cwe-79-improper-neutralization-of-in-55e6dfdd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajay%20Contextual%20Related%20Posts&amp;severity=medium&amp;id=69e3699bbdfbbecc5948ef72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tycoon-2fa-loses-phishing-kit-crown-amid-surge-in--4fc6dca0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tycoon%202FA%20Loses%20Phishing%20Kit%20Crown%20Amid%20Surge%20in%20Attacks&amp;severity=low&amp;id=69e35f0fbdfbbecc593a5dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2505-cwe-79-improper-neutralization-of-in-ce86bd04</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elzahlan%20Categories%20Images&amp;severity=medium&amp;id=69e350febdfbbecc5928ea79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0894-cwe-79-improper-neutralization-of-in-d357c715</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vanderwijk%20Content%20Blocks%20(Custom%20Post%20Widget)&amp;severity=medium&amp;id=69e350febdfbbecc5928ea75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41254-cwe-696-incorrect-behavior-order-in-c1167541</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41254%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20littlecms%20little%20cms%20color%20engine&amp;severity=medium&amp;id=69e32a52bdfbbecc59fc2b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32690-cwe-668-exposure-of-resource-to-wro-f351e5c3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32690%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=low&amp;id=69e32a52bdfbbecc59fc2b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30898-cwe-77-improper-neutralization-of-s-51fb13b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30898%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e32a52bdfbbecc59fc2b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30912-cwe-668-exposure-of-resource-to-wro-513606f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30912%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e32a52bdfbbecc59fc2b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25917-cwe-502-deserialization-of-untruste-00460742</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25917%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e32a52bdfbbecc59fc2b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32228-cwe-863-incorrect-authorization-in--de69187e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32228%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e32a52bdfbbecc59fc2b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6048-cwe-79-improper-neutralization-of-in-68a26ee3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dragwyb%20Flipbox%20Addon%20for%20Elementor&amp;severity=medium&amp;id=69e30ab8bdfbbecc59e84c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6518-cwe-434-unrestricted-upload-of-file--f3d41796</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6518%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20niteo%20CMP%20%E2%80%93%20Coming%20Soon%20%26%20Maintenance%20Plugin%20by%20NiteoThemes&amp;severity=high&amp;id=69e30ab8bdfbbecc59e84c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4801-cwe-79-improper-neutralization-of-in-4fb83809</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20godaddy%20Page%20Builder%20Gutenberg%20Blocks%20%E2%80%93%20CoBlocks&amp;severity=medium&amp;id=69e30ab8bdfbbecc59e84c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40494-cwe-787-out-of-bounds-write-in-happ-d7181ae5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40494%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20HappySeaFox%20sail&amp;severity=critical&amp;id=69e2ee8ebdfbbecc59cda5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40493-cwe-787-out-of-bounds-write-in-happ-da0d28a1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40493%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20HappySeaFox%20sail&amp;severity=critical&amp;id=69e2ee8ebdfbbecc59cda5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40492-cwe-787-out-of-bounds-write-in-happ-780830ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40492%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20HappySeaFox%20sail&amp;severity=critical&amp;id=69e2ee8ebdfbbecc59cda5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40491-cwe-22-improper-limitation-of-a-pat-8fb3f370</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40491%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wkentaro%20gdown&amp;severity=medium&amp;id=69e2ee8ebdfbbecc59cda5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40490-cwe-200-exposure-of-sensitive-infor-4c645570</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40490%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20AsyncHttpClient%20async-http-client&amp;severity=medium&amp;id=69e2e080bdfbbecc59c723b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1559-cwe-79-improper-neutralization-of-in-ac5deafd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69e2e080bdfbbecc59c72393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1838-cwe-79-improper-neutralization-of-in-b0d19334</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1838%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasunsen%20Hostel&amp;severity=medium&amp;id=69e2e080bdfbbecc59c7239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40489-cwe-121-stack-based-buffer-overflow-63bc89f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40489%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20editorconfig%20editorconfig-core-c&amp;severity=high&amp;id=69e2e080bdfbbecc59c723af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40487-cwe-79-improper-neutralization-of-i-d95bc08f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40487%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69e2e080bdfbbecc59c723ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35582-cwe-78-improper-neutralization-of-s-8a32499e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35582%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=high&amp;id=69e2e080bdfbbecc59c723a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35465-cwe-73-external-control-of-file-nam-276a142e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35465%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20freedomofpress%20securedrop-client&amp;severity=high&amp;id=69e2d977bdfbbecc59bbf816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40572-cwe-269-improper-privilege-manageme-6ff979fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40572%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20MinecAnton209%20NovumOS&amp;severity=critical&amp;id=69e2d977bdfbbecc59bbf825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40317-cwe-269-improper-privilege-manageme-d4098dd0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40317%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20MinecAnton209%20NovumOS&amp;severity=critical&amp;id=69e2d977bdfbbecc59bbf81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40350-cwe-863-incorrect-authorization-in--410a207f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40350%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20leepeuker%20movary&amp;severity=high&amp;id=69e2d977bdfbbecc59bbf81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40349-cwe-862-missing-authorization-in-le-02f722bd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40349%3A%20CWE-862%3A%20Missing%20Authorization%20in%20leepeuker%20movary&amp;severity=high&amp;id=69e389f6bdfbbecc5976511a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40593-cwe-79-improper-neutralization-of-i-66d417db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40593%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69e389f6bdfbbecc59765137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40348-cwe-918-server-side-request-forgery-d56b3db1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40348%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20leepeuker%20movary&amp;severity=high&amp;id=69e389f6bdfbbecc597650fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-19-fb6aae4d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-19&amp;severity=medium&amp;id=69e4e39d19fe3cd2cd5beb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-18-260f1eb3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-18&amp;severity=medium&amp;id=69e41cddbdfbbecc59f94a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-18-674dd18f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-18&amp;severity=low&amp;id=69e3385abdfbbecc5904514a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40347-cwe-400-uncontrolled-resource-consu-dd3e1813</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40347%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Kludex%20python-multipart&amp;severity=medium&amp;id=69e389f6bdfbbecc597650d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40346-cwe-918-server-side-request-forgery-4c00a4d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40346%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nocobase%20%40nocobase%2Fplugin-workflow-request&amp;severity=medium&amp;id=69e389f6bdfbbecc597650b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40581-cwe-352-cross-site-request-forgery--655587d2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40581%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69e389f6bdfbbecc5976522a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40337-cwe-283-unverified-ownership-in-cam-9fdaee9d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40337%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20camelot-os%20sentry-kernel&amp;severity=medium&amp;id=69e389f6bdfbbecc59765143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40341-cwe-126-buffer-over-read-in-gphoto--d243331d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40341%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20gphoto%20libgphoto2&amp;severity=low&amp;id=69e389f6bdfbbecc59765178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40340-cwe-125-out-of-bounds-read-in-gphot-5cade0b0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40340%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e389f6bdfbbecc5976516c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40339-cwe-125-out-of-bounds-read-in-gphot-ed5c11f7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40339%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e389f6bdfbbecc59765160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40338-cwe-125-out-of-bounds-read-in-gphot-6a685a62</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40338%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e389f6bdfbbecc59765158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40485-cwe-307-improper-restriction-of-exc-cf6d1aaa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40485%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69e2c47fbdfbbecc59a12f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40336-cwe-401-missing-release-of-memory-a-a2494142</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40336%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20gphoto%20libgphoto2&amp;severity=low&amp;id=69e2c47fbdfbbecc59a12f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2262-cwe-200-exposure-of-sensitive-inform-bf4d032f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2262%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20easyappointments%20Easy%20Appointments&amp;severity=high&amp;id=69e2c47fbdfbbecc59a12f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40484-cwe-269-improper-privilege-manageme-9bb4be14</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40484%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69e2c47fbdfbbecc59a12f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40483-cwe-79-improper-neutralization-of-i-cb8800e1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40483%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69e2c47fbdfbbecc59a12f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40335-cwe-125-out-of-bounds-read-in-gphot-7d4c84a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40335%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e2c47fbdfbbecc59a12f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40334-cwe-170-improper-null-termination-i-ecdcb16f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40334%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20gphoto%20libgphoto2&amp;severity=low&amp;id=69e2c0dabdfbbecc599fc050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40582-cwe-288-authentication-bypass-using-58dc9576</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40582%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69e2c0dabdfbbecc599fc05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40333-cwe-125-out-of-bounds-read-in-gphot-d0b9db38</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40333%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e2c0dabdfbbecc599fc04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40480-cwe-639-authorization-bypass-throug-7ebb7a44</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40480%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69e2c0dabdfbbecc599fc054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40324-cwe-674-uncontrolled-recursion-in-c-0796aaf1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40324%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20ChilliCream%20graphql-platform&amp;severity=critical&amp;id=69e2c0dabdfbbecc599fc03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40482-cwe-89-improper-neutralization-of-s-efd3f903</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40482%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69e2c0dabdfbbecc599fc05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40323-cwe-345-insufficient-verification-o-ab02000f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40323%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20succinctlabs%20sp1&amp;severity=high&amp;id=69e2c0dabdfbbecc599fc03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2434-cwe-79-improper-neutralization-of-in-459b3fb2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20poporon%20Pz-LinkCard&amp;severity=medium&amp;id=69e389f6bdfbbecc5976522f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40476-cwe-407-inefficient-algorithmic-com-930c0f33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40476%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20webonyx%20graphql-php&amp;severity=medium&amp;id=69e2af46bdfbbecc59986553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5720-cwe-191-integer-underflow-wrap-or-wr-5076503c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5720%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20miniupnp%20project%20miniupnpd&amp;severity=high&amp;id=69e2abc2bdfbbecc5996b9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40474-cwe-284-improper-access-control-in--3a8ced96</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40474%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20wger-project%20wger&amp;severity=high&amp;id=69e2abc2bdfbbecc5996b9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40353-cwe-79-improper-neutralization-of-i-32ce955d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40353%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wger-project%20wger&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40258-cwe-22-improper-limitation-of-a-pat-00f841f8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40258%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gramps-project%20gramps-web-api&amp;severity=critical&amp;id=69e2a83ebdfbbecc5994f12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40321-cwe-87-improper-neutralization-of-a-2d570284</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40321%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=69e2a83ebdfbbecc5994f140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40352-cwe-943-improper-neutralization-of--85ada05a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40352%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20labring%20FastGPT&amp;severity=high&amp;id=69e2a83ebdfbbecc5994f149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40306-cwe-330-use-of-insufficiently-rando-0a094187</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40306%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f13c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40305-cwe-285-improper-authorization-in-d-259f7178</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40305%3A%20CWE-285%3A%20Improper%20Authorization%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40351-cwe-943-improper-neutralization-of--9a2571c7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40351%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20labring%20FastGPT&amp;severity=critical&amp;id=69e2a83ebdfbbecc5994f144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40304-cwe-284-improper-access-control-in--69c6782f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40304%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20openziti%20zrok&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40303-cwe-400-uncontrolled-resource-consu-a3ee6743</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40303%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20openziti%20zrok&amp;severity=high&amp;id=69e2a136bdfbbecc5990836b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40196-cwe-708-incorrect-ownership-assignm-e4b4344c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40196%3A%20CWE-708%3A%20Incorrect%20Ownership%20Assignment%20in%20sysadminsmedia%20homebox&amp;severity=high&amp;id=69e2a136bdfbbecc59908358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40302-cwe-79-improper-neutralization-of-i-859f7360</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40302%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openziti%20zrok&amp;severity=medium&amp;id=69e2a136bdfbbecc59908367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40155-cwe-863-incorrect-authorization-in--178dd218</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40155%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20auth0%20nextjs-auth0&amp;severity=medium&amp;id=69e2a136bdfbbecc59908353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40301-cwe-79-improper-neutralization-of-i-bf3bd796</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40301%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rhukster%20dom-sanitizer&amp;severity=medium&amp;id=69e2a136bdfbbecc59908362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40299-cwe-601-url-redirection-to-untruste-c7560376</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40299%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20amannn%20next-intl&amp;severity=medium&amp;id=69e2a136bdfbbecc5990835c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35603-cwe-426-untrusted-search-path-in-an-d7db04c3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35603%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20anthropics%20claude-code&amp;severity=medium&amp;id=69e29db8bdfbbecc598ee1bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35402-cwe-284-improper-access-control-in--3725f4c7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35402%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20neo4j-contrib%20mcp-neo4j&amp;severity=low&amp;id=69e29db8bdfbbecc598ee1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33436-cwe-20-improper-input-validation-in-995166fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33436%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=low&amp;id=69e29db8bdfbbecc598ee1b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40286-cwe-79-improper-neutralization-of-i-b05f9ace</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40286%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69e29db8bdfbbecc598ee1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40285-cwe-89-improper-neutralization-of-s-36595b32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40285%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69e29db8bdfbbecc598ee1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40527-cwe-78-improper-neutralization-of-s-8835a9bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40527%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radareorg%20radare2&amp;severity=high&amp;id=69e29db8bdfbbecc598ee1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40284-cwe-79-improper-neutralization-of-i-a78ebb3c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40284%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69e29db8bdfbbecc598ee1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35512-cwe-122-heap-based-buffer-overflow--c91ef269</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35512%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29a32bdfbbecc598cc5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40282-cwe-79-improper-neutralization-of-i-a407d8de</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40282%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69e29a32bdfbbecc598cc5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33689-cwe-125-out-of-bounds-read-in-neutr-038fd12f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33689%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29a32bdfbbecc598cc5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33145-cwe-78-improper-neutralization-of-s-356aab43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33145%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=69e29a32bdfbbecc598cc5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40283-cwe-79-improper-neutralization-of-i-881385d3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40283%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69e29327bdfbbecc59895032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32624-cwe-122-heap-based-buffer-overflow--cb3226cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32624%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=69e29327bdfbbecc5989501f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33516-cwe-125-out-of-bounds-read-in-neutr-043d919d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33516%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29327bdfbbecc59895028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32650-cwe-757-in-anviz-anviz-crosschex-st-9f992419</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32650%3A%20CWE-757%20in%20Anviz%20Anviz%20CrossChex%20Standard&amp;severity=high&amp;id=69e29327bdfbbecc59895023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40434-cwe-940-in-anviz-anviz-crosschex-st-bb1f864a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40434%3A%20CWE-940%20in%20Anviz%20Anviz%20CrossChex%20Standard&amp;severity=high&amp;id=69e29327bdfbbecc59895035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35682-cwe-77-in-anviz-anviz-cx2-lite-firm-73192145</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35682%3A%20CWE-77%20in%20Anviz%20Anviz%20CX2%20Lite%20Firmware&amp;severity=high&amp;id=69e29327bdfbbecc5989502c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32623-cwe-122-heap-based-buffer-overflow--e8ed9695</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32623%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29327bdfbbecc5989501b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40066-cwe-494-in-anviz-anviz-cx7-firmware-8338be60</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40066%3A%20CWE-494%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=high&amp;id=69e28fa4bdfbbecc59867cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35546-cwe-306-in-anviz-anviz-cx7-firmware-147e04a2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35546%3A%20CWE-306%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=critical&amp;id=69e28fa4bdfbbecc59867cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40461-cwe-306-in-anviz-anviz-cx7-firmware-c1966de7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40461%3A%20CWE-306%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=high&amp;id=69e28fa7bdfbbecc59867d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32648-cwe-862-in-anviz-anviz-cx7-firmware-aaa03fdc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32648%3A%20CWE-862%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33569-cwe-319-in-anviz-anviz-cx7-firmware-b7940a80</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33569%3A%20CWE-319%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32105-cwe-354-improper-validation-of-inte-71bf3dd4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32105%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20neutrinolabs%20xrdp&amp;severity=critical&amp;id=69e28fa3bdfbbecc59867c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32107-cwe-273-improper-check-for-dropped--30bf230c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32107%3A%20CWE-273%3A%20Improper%20Check%20for%20Dropped%20Privileges%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e28fa3bdfbbecc59867c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31927-cwe-23-in-anviz-anviz-cx7-firmware-64eea7cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31927%3A%20CWE-23%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40342-cwe-22-improper-limitation-of-a-pat-aa1db711</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40342%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FirebirdSQL%20firebird&amp;severity=critical&amp;id=69e28fa4bdfbbecc59867cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32324-cwe-321-use-of-hard-coded-cryptogra-6037edd2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32324%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=high&amp;id=69e28fa3bdfbbecc59867ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35061-cwe-862-in-anviz-anviz-cx7-firmware-3ac096cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35061%3A%20CWE-862%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33093-cwe-862-in-anviz-anviz-cx7-firmware-d552bc73</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33093%3A%20CWE-862%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e2889bbdfbbecc59818af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/white-house-chief-of-staff-to-meet-with-anthropic--a17193c8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=White%20House%20Chief%20of%20Staff%20to%20Meet%20With%20Anthropic%20CEO%20Over%20Its%20New%20AI%20Technology&amp;severity=medium&amp;id=69e39ad9bdfbbecc59850336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35215-cwe-369-divide-by-zero-in-firebirds-3a7b530a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35215%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e2889bbdfbbecc59818afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-kata-and-kedr-to-detect-the-adaptixc2-agent-9d6969c9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20KATA%20and%20KEDR%20to%20detect%20the%20AdaptixC2%20agent&amp;severity=medium&amp;id=69e603f419fe3cd2cdd9a2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34232-cwe-228-improper-handling-of-syntac-b5b28669</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34232%3A%20CWE-228%3A%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e2889bbdfbbecc59818af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33337-cwe-120-buffer-copy-without-checkin-5abedb12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33337%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e28194bdfbbecc597b95dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6437-cwe-88-improper-neutralization-of-ar-9d56e73b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6437%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Amazon%20AWS%20EFS%20CSI%20Driver&amp;severity=medium&amp;id=69e28194bdfbbecc597b95e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28224-cwe-476-null-pointer-dereference-in-bc196dc8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28224%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e28194bdfbbecc597b95d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28214-cwe-190-integer-overflow-or-wraparo-2b0bca7e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28214%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20FirebirdSQL%20firebird&amp;severity=medium&amp;id=69e28194bdfbbecc597b95d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40525-cwe-636-not-failing-securely-fail-o-ce5e8d5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40525%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Fail%20Open&apos;)%20in%20volcengine%20OpenViking&amp;severity=critical&amp;id=69e27e0fbdfbbecc5978c959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27890-cwe-119-improper-restriction-of-ope-87051bc6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27890%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e27e0fbdfbbecc5978c94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28212-cwe-476-null-pointer-dereference-in-d3281e4a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28212%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e27e0fbdfbbecc5978c953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65104-cwe-200-exposure-of-sensitive-infor-818cb5d8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65104%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e27e0fbdfbbecc5978c95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5718-cwe-434-unrestricted-upload-of-file--1133bfad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5718%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69e273aebdfbbecc5970e963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5710-cwe-22-improper-limitation-of-a-path-1345068b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5710%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69e273aebdfbbecc5970e95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40320-cwe-1336-improper-neutralization-of-7c3e97b3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40320%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Giskard-AI%20giskard-oss&amp;severity=medium&amp;id=69e273aebdfbbecc5970e958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40319-cwe-1333-inefficient-regular-expres-c4bed657</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40319%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Giskard-AI%20giskard-oss&amp;severity=low&amp;id=69e26ffebdfbbecc596e17be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40518-cwe-22-improper-limitation-of-a-pat-95c4c5a3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bytedance%20deer-flow&amp;severity=high&amp;id=69e26909bdfbbecc5968fd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3464-cwe-22-improper-limitation-of-a-path-16d32bc0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3464%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aguilatechnologies%20WP%20Customer%20Area&amp;severity=high&amp;id=69e28194bdfbbecc597b95e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21733-cwe-280-improper-handling-of-insuff-ad2adca4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21733%3A%20Vulnerability%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69e25e76bdfbbecc595f3fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40516-cwe-918-server-side-request-forgery-74d5147e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40516%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e25e76bdfbbecc595f3fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40515-cwe-863-incorrect-authorization-in--67f24981</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40515%3A%20CWE-863%20Incorrect%20Authorization%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e25e76bdfbbecc595f3fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21709-cwe-77-command-injection-generic-in-3efaa943</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21709%3A%20CWE-77%20Command%20Injection%20-%20Generic%20in%20Veeam%20Backup%20and%20Replication&amp;severity=medium&amp;id=69e253e3bdfbbecc593fb259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6497-server-side-request-forgery-in-prasa-47b23fe1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6497%3A%20Server-Side%20Request%20Forgery%20in%20prasathmani%20TinyFileManager&amp;severity=medium&amp;id=69e253e3bdfbbecc593fb262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6284-cwe-521-in-horner-automation-cscape-17ab7886</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6284%3A%20CWE-521%20in%20Horner%20Automation%20Cscape&amp;severity=critical&amp;id=69e253e3bdfbbecc593fb25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cochat-launches-ai-collaboration-platform-to-comba-be9f2b7f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CoChat%20Launches%20AI%20Collaboration%20Platform%20to%20Combat%20Shadow%20AI&amp;severity=medium&amp;id=69e24cd8bdfbbecc5936df5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6496-path-traversal-in-prasathmani-tinyfi-efd352ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6496%3A%20Path%20Traversal%20in%20prasathmani%20TinyFileManager&amp;severity=medium&amp;id=69e2495cbdfbbecc5932f325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41153-cwe-77-in-jetbrains-junie-621e3a60</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41153%3A%20CWE-77%20in%20JetBrains%20Junie&amp;severity=medium&amp;id=69e2495cbdfbbecc5932f319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-seedworm-targets-global-organizations--329f9990</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20Seedworm%20Targets%20Global%20Organizations%20via%20Microsoft%20Teams&amp;severity=medium&amp;id=69e60afe19fe3cd2cde02d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6493-cross-site-scripting-in-lukevella-ra-55aea1e3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6493%3A%20Cross%20Site%20Scripting%20in%20lukevella%20rallly&amp;severity=medium&amp;id=69e2495cbdfbbecc5932f31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6492-information-disclosure-in-arnobt78-h-8be294ba</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6492%3A%20Information%20Disclosure%20in%20arnobt78%20Hotel%20Booking%20Management%20System&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6491-heap-based-buffer-overflow-in-libvip-10e77d09</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6491%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6490-sql-injection-in-querymine-sms-bc581eac</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6490%3A%20SQL%20Injection%20in%20QueryMine%20sms&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leverage-leaked-government-intelligence-to-b4f7d6c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20leverage%20leaked%20government%20intelligence%20tools%20to%20target%20everyday%20iOS%20users%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69e232d082d89c981ff8363c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6489-unrestricted-upload-in-querymine-sms-e4c4a996</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6489%3A%20Unrestricted%20Upload%20in%20QueryMine%20sms&amp;severity=medium&amp;id=69e232c582d89c981ff828a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6488-sql-injection-in-querymine-sms-fe0ba541</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6488%3A%20SQL%20Injection%20in%20QueryMine%20sms&amp;severity=medium&amp;id=69e232c582d89c981ff828a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6487-path-traversal-in-qihui-jtbc5-cms-3548fc5d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6487%3A%20Path%20Traversal%20in%20Qihui%20jtbc5%20CMS&amp;severity=medium&amp;id=69e22bbf82d89c981ff3d63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6507-out-of-bounds-write-in-red-hat-red-h-280b3ba7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6507%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69e22bbf82d89c981ff3d640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6486-cross-site-scripting-in-classroomboo-de02e171</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6486%3A%20Cross%20Site%20Scripting%20in%20classroombookings&amp;severity=medium&amp;id=69e22bbf82d89c981ff3d630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-satellite-cybersecurity-act-90k-chro-613e8ad0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Satellite%20Cybersecurity%20Act%2C%20%2490K%20Chrome%20Flaw%2C%20Teen%20Hacker%20Arrested&amp;severity=medium&amp;id=69e2213282d89c981fe4aa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23777-cwe-200-exposure-of-sensitive-infor-cd82fbb5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23777%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2213882d89c981fe4b085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28263-cwe-79-improper-neutralization-of-i-1acafaea</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28263%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2213882d89c981fe4b088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46606-cwe-307-improper-restriction-of-exc-307f50dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46606%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2213882d89c981fe4b082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46605-cwe-384-session-fixation-in-dell-po-5b99807b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46605%3A%20CWE-384%3A%20Session%20Fixation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e21daf82d89c981fdb2544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46641-cwe-287-improper-authentication-in--c16ae6fc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46641%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e21daf82d89c981fdb254a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46607-cwe-287-improper-authentication-in--00ff1038</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46607%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e21daf82d89c981fdb2547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35073-cwe-78-improper-neutralization-of-s-c1ee811f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35073%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e216a682d89c981fce5844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35074-cwe-78-improper-neutralization-of-s-c4f8a7e5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35074%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e216a682d89c981fce5847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35072-cwe-78-improper-neutralization-of-s-8793ed88</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35072%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e216a682d89c981fce5841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5131-cwe-918-server-side-request-forgery--eefe7b1a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5131%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Nomios%20Poland%20GREENmod&amp;severity=medium&amp;id=69e216a682d89c981fce584a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-draftkings-hacker-sentenced-to-prison-6dbd7bd3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20DraftKings%20Hacker%20Sentenced%20to%20Prison&amp;severity=medium&amp;id=69e20f9d82d89c981fc9fc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35153-cwe-88-improper-neutralization-of-a-7210f906</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35153%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e20fa682d89c981fca00e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6483-os-command-injection-in-wavlink-wl-w-2cff4fef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6483%3A%20OS%20Command%20Injection%20in%20Wavlink%20WL-WN530H4&amp;severity=high&amp;id=69e20fa682d89c981fca00eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lawmakers-gathered-quietly-to-talk-about-ai-angst--ccf87bec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lawmakers%20Gathered%20Quietly%20to%20Talk%20About%20AI.%20Angst%20and%20Fears%20of%20%E2%80%98Destruction%E2%80%99%20Followed&amp;severity=low&amp;id=69e2089582d89c981fc3e568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-apache-activemq-vulnerability-exploited-in--98176e07</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Apache%20ActiveMQ%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=69e2051182d89c981fbef2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/direct-sys-loader-and-cgrabber-stealer-five-stage--50867bbc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Direct-Sys%20Loader%20and%20CGrabber%20Stealer%20Five-Stage%20Malware%20Chain&amp;severity=medium&amp;id=69e20c1982d89c981fc7230c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-north-korean-it-worker-scheme-facilitators-jai-6bb45449</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20North%20Korean%20IT%20Worker%20Scheme%20Facilitators%20Jailed%20in%20the%20US&amp;severity=medium&amp;id=69e1fe0982d89c981fb5bea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23779-cwe-77-improper-neutralization-of-s-9bc42051</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23779%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2142082d89c981fcd7c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23776-cwe-295-improper-certificate-valida-1a2a1c1a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23776%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e2142082d89c981fcd7c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15625-cwe-89-improper-neutralization-of-s-bf191582</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15625%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Pro%20Cloud%20Server&amp;severity=critical&amp;id=69e1f70182d89c981fb0d48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15624-cwe-256-plaintext-storage-of-a-pass-907ae5f0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15624%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Pro%20Cloud%20Server&amp;severity=critical&amp;id=69e1f70182d89c981fb0d48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-macos-intrusion-from-lure-to-compromise-3c857763</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20macOS%20intrusion%20from%20lure%20to%20compromise&amp;severity=medium&amp;id=69e20c1982d89c981fc722f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15623-cwe-359-exposure-of-private-persona-24f01d16</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15623%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Pro%20Cloud%20Server&amp;severity=critical&amp;id=69e1f70182d89c981fb0d489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/takes-aim-at-the-ransomware-throne-f043d8a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Takes%20Aim%20at%20the%20Ransomware%20Throne&amp;severity=medium&amp;id=69e216a482d89c981fce57d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/joomla-seo-spam-injector-obfuscated-php-backdoor-h-3d3ff1e9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Joomla%20SEO%20Spam%20Injector%3A%20Obfuscated%20PHP%20Backdoor%20Hijacking%20Site%20Visitors&amp;severity=medium&amp;id=69e20c1982d89c981fc722ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15622-cwe-522-insufficiently-protected-cr-996dbedb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15622%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Enterprise%20Architect&amp;severity=medium&amp;id=69e1f70182d89c981fb0d486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23778-cwe-77-improper-neutralization-of-s-56720612</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23778%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e1f70182d89c981fb0d498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zionsiphon-malware-targets-ics-in-water-facilities-233fe40a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZionSiphon%20Malware%20Targets%20ICS%20in%20Water%20Facilities&amp;severity=medium&amp;id=69e1eff982d89c981faac8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6439-cwe-79-improper-neutralization-of-in-d245a58b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jconti%20VideoZen&amp;severity=medium&amp;id=69e1f70182d89c981fb0d49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23775-cwe-532-insertion-of-sensitive-info-d2230f77</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23775%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20PowerProtect%20Data%20Domain%20appliances&amp;severity=high&amp;id=69e1f70182d89c981fb0d495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6494-improper-output-neutralization-for-l-4b481af2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6494%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=medium&amp;id=69e1f70182d89c981fb0d4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36568-cwe-522-insufficiently-protected-cr-2289d391</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36568%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Dell%20PowerProtect%20Data%20Domain%20BoostFS&amp;severity=high&amp;id=69e1f70182d89c981fb0d492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33392-cwe-1336-in-jetbrains-youtrack-3a31f8ef</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33392%3A%20CWE-1336%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=69e1ec7982d89c981fa85cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6451-cwe-352-cross-site-request-forgery-c-12074053</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6451%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tholstkabelbwde%20Plugin%3A%20CMS%20f%C3%BCr%20Motorrad%20Werkst%C3%A4tten&amp;severity=medium&amp;id=69e1ec7982d89c981fa85cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40002-cwe-269-improper-privilege-manageme-d0b7c01c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40002%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ZTE%20Red%20Magic%2011%20Pro%20(NX809J)&amp;severity=medium&amp;id=69e1ec7982d89c981fa85cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cursor-ai-vulnerability-exposed-developer-devices-fd612bab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cursor%20AI%20Vulnerability%20Exposed%20Developer%20Devices&amp;severity=medium&amp;id=69e1e1ea82d89c981fa15800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23853-cwe-1391-use-of-weak-credentials-in-0ee220b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23853%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e1e1f282d89c981fa18deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6441-cwe-862-missing-authorization-in-fli-d2f596ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6441%3A%20CWE-862%20Missing%20Authorization%20in%20flightbycanto%20Canto&amp;severity=medium&amp;id=69e1dae182d89c981f9ddccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4659-cwe-22-improper-limitation-of-a-path-b8b0c25b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4659%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=high&amp;id=69e1dae182d89c981f9ddcbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6443-cwe-506-embedded-malicious-code-in-e-b2b69859</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6443%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20essentialplugin%20Accordion%20and%20Accordion%20Slider&amp;severity=critical&amp;id=69e1dae182d89c981f9ddcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/53-ddos-domains-taken-down-by-law-enforcement-27effe64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=53%20DDoS%20Domains%20Taken%20Down%20by%20Law%20Enforcement&amp;severity=medium&amp;id=69e1d75d82d89c981f9c927a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6421-uncontrolled-search-path-in-mobatek--798d08a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6421%3A%20Uncontrolled%20Search%20Path%20in%20Mobatek%20MobaXterm%20Home%20Edition&amp;severity=high&amp;id=69e1d07582d89c981f98f522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5797-cwe-74-improper-neutralization-of-sp-6841ef43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5797%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=69e1d07582d89c981f98f516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6482-cwe-829-inclusion-of-functionality-f-9df924df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6482%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20Rapid7%20Insight%20Agent&amp;severity=high&amp;id=69e1d07582d89c981f98f52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35496-improper-limitation-of-a-pathname-t-248f1cf1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35496%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20CubeCart%20Limited%20CubeCart&amp;severity=low&amp;id=69e1c5c782d89c981f8f173b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34018-improper-neutralization-of-special--6f9210ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34018%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20CubeCart%20Limited%20CubeCart&amp;severity=medium&amp;id=69e1c5c782d89c981f8f1737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21719-improper-neutralization-of-special--543f1327</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21719%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CubeCart%20Limited%20CubeCart&amp;severity=high&amp;id=69e1c5c782d89c981f8f1733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5502-cwe-862-missing-authorization-in-the-6f6eb17c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5502%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5427-cwe-862-missing-authorization-in-ext-b61f377a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5427%3A%20CWE-862%20Missing%20Authorization%20in%20extendthemes%20Kubio%20AI%20Page%20Builder&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5234-cwe-639-authorization-bypass-through-f0db2f8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5234%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6080-cwe-89-improper-neutralization-of-sp-ec35d5cc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6080%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3330-cwe-89-improper-neutralization-of-sp-fc732859</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3330%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4853-cwe-22-improper-limitation-of-a-path-b235121a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4853%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20backupguard%20JetBackup%20%E2%80%93%20Backup%2C%20Restore%20%26%20Migrate&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5807-cwe-770-allocation-of-resources-with-1203bc9f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5807%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=69e1b7b882d89c981f6ce769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4525-cwe-201-insertion-of-sensitive-infor-f43b0959</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4525%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=69e2142082d89c981fcd7c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5052-cwe-918-server-side-request-forgery--f41ab259</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5052%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=69e2142082d89c981fcd7c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3605-cwe-288-authentication-bypass-using--3597885d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3605%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=69e2142082d89c981fcd7c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4666-cwe-862-missing-authorization-in-tom-a89a54e6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4666%3A%20CWE-862%20Missing%20Authorization%20in%20tomdever%20wpForo%20Forum&amp;severity=medium&amp;id=69e2142082d89c981fcd7c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-friday-april-17th-2026-httpsiscs-6ec453ea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Friday%2C%20April%2017th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9896%2C%20(Fri%2C%20Apr%2017th)&amp;severity=medium&amp;id=69e1948f82d89c981f187ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3488-cwe-862-missing-authorization-in-ver-4c95e6b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3488%3A%20CWE-862%20Missing%20Authorization%20in%20veronalabs%20WP%20Statistics%20%E2%80%93%20Simple%2C%20privacy-friendly%20Google%20Analytics%20alternative&amp;severity=medium&amp;id=69e2142082d89c981fcd7c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5231-cwe-79-improper-neutralization-of-in-a4f49703</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20WP%20Statistics%20%E2%80%93%20Simple%2C%20privacy-friendly%20Google%20Analytics%20alternative&amp;severity=high&amp;id=69e2142082d89c981fcd7c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4817-cwe-89-improper-neutralization-of-sp-15c87136</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4817%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=69e2142082d89c981fcd7c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5162-cwe-79-improper-neutralization-of-in-2911a812</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5162%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69e2142082d89c981fcd7c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-infection-with-sectop-rat-arechclien-841ddb7c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20infection%20with%20Sectop%20RAT%20(ArechClient2)%2C%20(Fri%2C%20Apr%2017th)&amp;severity=medium&amp;id=69e228ca82d89c981fea5e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-18-8df3d9b1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-18&amp;severity=medium&amp;id=69e3385abdfbbecc59045186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-17-13b60f86</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-17&amp;severity=medium&amp;id=69e2cb5dbdfbbecc59a38896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37749-na-c4c6e5dc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37749%3A%20n%2Fa&amp;severity=critical&amp;id=69e24cdfbdfbbecc5936e931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31317-na-298e2b28</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31317%3A%20n%2Fa&amp;severity=high&amp;id=69e2424ebdfbbecc592bf51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70795-na-3b058274</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70795%3A%20n%2Fa&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-17-3b7ad22d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-17&amp;severity=low&amp;id=69e189fb82d89c981f03051b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40265-cwe-862-missing-authorization-in-en-645b045f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40265%3A%20CWE-862%3A%20Missing%20Authorization%20in%20enchant97%20note-mark&amp;severity=medium&amp;id=69e1786e82d89c981fe335c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40263-cwe-208-observable-timing-discrepan-cfedb65e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40263%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20enchant97%20note-mark&amp;severity=low&amp;id=69e1786e82d89c981fe335c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40262-cwe-79-improper-neutralization-of-i-795a0901</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40262%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enchant97%20note-mark&amp;severity=high&amp;id=69e1786e82d89c981fe335c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22734-cwe-290-authentication-bypass-by-sp-5e7666ae</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22734%3A%20CWE-290%20Authentication%20bypass%20by%20spoofing%20in%20Cloud%20Foundry%20UUA&amp;severity=high&amp;id=69e174eb82d89c981fe07a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40260-cwe-776-improper-restriction-of-rec-0042eef4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40260%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e1716682d89c981fde6ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40922-cwe-79-improper-neutralization-of-i-4ec62a5e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40922%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69e1716682d89c981fde6ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40322-cwe-79-improper-neutralization-of-i-7309fd84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40322%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69e2142282d89c981fcd7cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40318-cwe-24-path-traversal-filedir-in-si-705041eb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40318%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69e2142282d89c981fcd7cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40259-cwe-285-improper-authorization-in-s-895cf1a6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40259%3A%20CWE-285%3A%20Improper%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69e2142282d89c981fcd7ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58343-cwe-425-direct-request-forced-brows-9cba515d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58343%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Vision%20Helpdesk&amp;severity=medium&amp;id=69e166dc82d89c981fd8594b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40255-cwe-601-url-redirection-to-untruste-2655ea65</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40255%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20adonisjs%20http-server&amp;severity=medium&amp;id=69e166dc82d89c981fd8594f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41113-cwe-78-improper-neutralization-of-s-94bbf1c0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41113%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sagredo%20qmail&amp;severity=high&amp;id=69e15fdc82d89c981fd52eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40308-cwe-639-authorization-bypass-throug-2a3d8569</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40308%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20joedolson%20my-calendar&amp;severity=high&amp;id=69e158cb82d89c981fcfb81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39313-cwe-770-allocation-of-resources-wit-d82a0598</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39313%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20QuantGeekDev%20mcp-framework&amp;severity=high&amp;id=69e1554682d89c981fce0d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35469-cwe-770-allocation-of-resources-wit-42aeeefc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35469%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20moby%20spdystream&amp;severity=high&amp;id=69e1554682d89c981fce0d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34164-cwe-532-insertion-of-sensitive-info-7422ab0f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34164%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20valtimo-platform%20valtimo&amp;severity=medium&amp;id=69e1554682d89c981fce0d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-compromised-dvrs-and-finding-the-90c96254</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Compromised%20DVRs%20and%20Finding%20Them%20in%20the%20Wild%2C%20(Thu%2C%20Apr%2016th)&amp;severity=medium&amp;id=69e026f282d89c981fac32b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54502-cwe-668-exposure-of-resource-to-wro-81812557</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54502%3A%20CWE-668%20%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=high&amp;id=69e135ad82d89c981fbaa760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54510-cwe-414-missing-lock-check-in-amd-a-02b6fcae</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54510%3A%20CWE-414%20%20Missing%20Lock%20Check%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=69e135ad82d89c981fbaa767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6442-improper-validation-of-syntactic-cor-5ef413e4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6442%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Snowflake%20Cortex%20Code%20CLI&amp;severity=high&amp;id=69e135ad82d89c981fbaa76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43937-cwe-532-insertion-of-sensitive-info-e934c167</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43937%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69e12b2c82d89c981fb4018a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43935-cwe-404-improper-resource-shutdown--7a666ab7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43935%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69e12b2c82d89c981fb40187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43883-cwe-754-improper-check-for-unusual--f3e6c01f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43883%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69e1241082d89c981fafb50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41082-cwe-24-path-traversal-filedir-in-oc-bd86f374</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41082%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20OCaml%20opam&amp;severity=high&amp;id=69e1241082d89c981fafb517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27820-cwe-120-buffer-copy-without-checkin-64d72ec9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27820%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ruby%20zlib&amp;severity=low&amp;id=69e1241082d89c981fafb513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24749-cwe-863-incorrect-authorization-in--5b90cce9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24749%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20silverstripe%20silverstripe-assets&amp;severity=medium&amp;id=69e11d0782d89c981fabdc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2336-cwe-331-insufficient-entropy-in-micr-ec06bd07</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2336%3A%20CWE-331%20Insufficient%20entropy%20in%20Microchip%20IStaX&amp;severity=high&amp;id=69e11d0782d89c981fabdc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/government-cant-win-the-cyber-war-without-the-priv-64dfa608</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Government%20Can%E2%80%99t%20Win%20the%20Cyber%20War%20Without%20the%20Private%20Sector&amp;severity=medium&amp;id=69e2289d82d89c981fe9c065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41080-cwe-331-insufficient-entropy-in-lib-c31d4d69</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41080%3A%20CWE-331%20Insufficient%20Entropy%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=69e1160082d89c981fa7a67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36579-cwe-640-weak-password-recovery-mech-2b6472cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36579%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Dell%20Dell%20Pro%2014%20Essential%20PV14250&amp;severity=medium&amp;id=69e10ef782d89c981fa32a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5426-cwe-321-use-of-hard-coded-cryptograp-c04eb03f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5426%3A%20CWE-321%20Use%20of%20hard-coded%20cryptographic%20key%20in%20Digital%20Knowledge%20KnowledgeDeliver&amp;severity=high&amp;id=69e107ef82d89c981f9dd1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3324-cwe-288-authentication-bypass-using--8de21145</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3324%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20Zohocorp%20ManageEngine%20Log360&amp;severity=high&amp;id=69e0fd6982d89c981f97e31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6409-cwe-20-improper-input-validation-in--22b0fb12</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6409%3A%20CWE-20%20Improper%20input%20validation%20in%20Protocol%20Buffers%20Protobuf-php%20(Pecl)&amp;severity=high&amp;id=69e0fd6982d89c981f97e325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-widens-access-to-cybersecurity-model-after--1f8de97c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Widens%20Access%20to%20Cybersecurity%20Model%20After%20Anthropic%E2%80%99s%20Mythos%20Reveal&amp;severity=low&amp;id=69e0f2d882d89c981f918a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2840-cwe-79-improper-neutralization-of-in-a5c9240c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2840%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onlineoptimisation%20Email%20Encoder%20%E2%80%93%20Protect%20Email%20Addresses%20and%20Phone%20Numbers&amp;severity=medium&amp;id=69e0f2f482d89c981f91994c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5785-cwe-89-improper-neutralization-of-sp-0f41a3b7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5785%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Zohocorp%20ManageEngine%20PAM360&amp;severity=high&amp;id=69e0ebd382d89c981f8ceb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31987-cwe-532-insertion-of-sensitive-info-033f814f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31987%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e0ebd382d89c981f8ceb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4160-cwe-639-authorization-bypass-through-737667b3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4160%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=69e0ebd382d89c981f8ceb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31843-cwe-284-improper-access-control-lea-f84d8bc9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31843%3A%20CWE-284%20Improper%20Access%20Control%20leading%20to%20unauthorized%20modification%20of%20executable%20application%20files%20in%20goodoneuz%20pay-uz&amp;severity=critical&amp;id=69e0e14482d89c981f87fef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-the-breach-inside-a-cargo-theft-actors-post-8348f717</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20the%20breach%3A%20inside%20a%20cargo%20theft%20actor&apos;s%20post-compromise%20playbook&amp;severity=medium&amp;id=69e0fd6282d89c981f97da61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-breach-at-tennessee-hospital-affects-337000-2215ef61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Breach%20at%20Tennessee%20Hospital%20Affects%20337%2C000&amp;severity=medium&amp;id=69e0da3c82d89c981f841d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15621-cwe-522-insufficiently-protected-cr-9776e2a7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15621%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Enterprise%20Architect&amp;severity=medium&amp;id=69e0dabc82d89c981f8468d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/artemis-emerges-from-stealth-with-70-million-in-fu-27c08fc2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Artemis%20Emerges%20From%20Stealth%20With%20%2470%20Million%20in%20Funding&amp;severity=medium&amp;id=69e0d5b782d89c981f81d0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/splunk-enterprise-update-patches-code-execution-vu-33e172b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Splunk%20Enterprise%20Update%20Patches%20Code%20Execution%20Vulnerability&amp;severity=critical&amp;id=69e0cfb082d89c981f7e8c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-paid-out-23-million-at-zero-day-quest-20-e0e428a4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Paid%20Out%20%242.3%20Million%20at%20Zero%20Day%20Quest%202026%20Hacking%20Contest&amp;severity=high&amp;id=69e0c8a882d89c981f7bc401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3155-cwe-862-missing-authorization-in-one-0aec828d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3155%3A%20CWE-862%20Missing%20Authorization%20in%20onesignal%20OneSignal%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=low&amp;id=69e0cc2b82d89c981f7cd61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3369-cwe-79-improper-neutralization-of-in-c1a5e10f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codesolz%20Better%20Find%20and%20Replace%20%E2%80%93%20AI-Powered%20Suggestions&amp;severity=medium&amp;id=69e0cc2b82d89c981f7cd620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3489-cwe-89-improper-neutralization-of-sp-65d3fe0f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3489%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20designinvento%20DirectoryPress%20%E2%80%93%20Business%20Directory%20And%20Classified%20Ad%20Listing&amp;severity=high&amp;id=69e0cc2b82d89c981f7cd625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nist-prioritizes-nvd-enrichment-for-cves-in-cisa-k-99bc1f23</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NIST%20Prioritizes%20NVD%20Enrichment%20for%20CVEs%20in%20CISA%20KEV%2C%20Critical%20Software&amp;severity=critical&amp;id=69e0c1a082d89c981f784255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12624-cwe-613-insufficient-session-expira-f9b47282</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12624%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=69e0be2882d89c981f771dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-vulnerabilities-in-webex-is-37a04699</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20Vulnerabilities%20in%20Webex%2C%20ISE&amp;severity=critical&amp;id=69e0b71482d89c981f73ee5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6024-cwe-79-improper-neutralization-of-in-7fcbb74f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6024%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=69e0c29882d89c981f78d921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10242-cwe-79-improper-neutralization-of-i-2529889f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10242%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=69e0c29882d89c981f78d917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8010-cwe-611-improper-restriction-of-xml--bce8385c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8010%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=low&amp;id=69e0c29882d89c981f78d91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4867-cwe-79-improper-neutralization-of-in-2c045398</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4867%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=69e0c29882d89c981f78d91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-hits-automotive-data-expert-autovista-cfd6d3fc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Hits%20Automotive%20Data%20Expert%20Autovista&amp;severity=medium&amp;id=69e0ac8882d89c981f7004c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39987-update-how-attackers-weaponized-mar-14d626d1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39987%20update%3A%20How%20attackers%20weaponized%20marimo%20to%20deploy%20a%20blockchain%20botnet%20via%20HuggingFace&amp;severity=medium&amp;id=69e0be2682d89c981f771daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-code-gemini-cli-github-copilot-agents-vulne-9c48456f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Code%2C%20Gemini%20CLI%2C%20GitHub%20Copilot%20Agents%20Vulnerable%20to%20Prompt%20Injection%20via%20Comments&amp;severity=medium&amp;id=69e0a1fc82d89c981f6a5fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23772-cwe-269-improper-privilege-manageme-a3c398f9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23772%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20Storage%20Manager&amp;severity=high&amp;id=69e0a58082d89c981f6c48ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2374-cwe-611-improper-restriction-of-xml--936e0b78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2374%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=high&amp;id=69e09e7782d89c981f68cc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0718-cwe-862-missing-authorization-in-wpx-3e9ed909</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0718%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20for%20News%2C%20Magazines%2C%20Blog%20Websites%20%E2%80%93%20PostX&amp;severity=medium&amp;id=69e093ed82d89c981f63c7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14868-cwe-22-improper-limitation-of-a-pat-9bfe3656</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14868%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20shahinurislam%20Career%20Section&amp;severity=high&amp;id=69e093ed82d89c981f63c7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41035-cwe-130-improper-handling-of-length-bf643584</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41035%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Samba%20rsync&amp;severity=high&amp;id=69e08ce482d89c981f5edf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3876-cwe-79-improper-neutralization-of-in-8cfb67a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Prismatic&amp;severity=high&amp;id=69e08ce482d89c981f5edf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3355-cwe-79-improper-neutralization-of-in-af9beb0d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=69e08ce482d89c981f5edf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13364-cwe-79-improper-neutralization-of-i-fce87c81</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=medium&amp;id=69e08ce482d89c981f5edf06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3875-cwe-79-improper-neutralization-of-in-5cd448ae</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20%20Knowledge%20Base%20Docs%20%26%20FAQ%20Solution%20for%20Elementor%20%26%20Block%20Editor&amp;severity=medium&amp;id=69e08ce482d89c981f5edf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3995-cwe-79-improper-neutralization-of-in-936a3d6f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3995%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20faridsaniee%20OPEN-BRAIN&amp;severity=medium&amp;id=69e08ce482d89c981f5edf28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1572-cwe-79-improper-neutralization-of-in-ca6fef49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1572%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20by%20Elementor&amp;severity=medium&amp;id=69e08ce482d89c981f5edf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1620-cwe-98-improper-control-of-filename--b5a6957f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1620%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20livemesh%20Livemesh%20Addons%20by%20Elementor&amp;severity=high&amp;id=69e08ce482d89c981f5edf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41034-cwe-125-out-of-bounds-read-in-ascen-1f86e56a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41034%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Ascensio%20ONLYOFFICE%20DocumentServer&amp;severity=medium&amp;id=69e0825782d89c981f59691a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3861-na-in-line-corporation-line-client-f-6f37bce9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3861%3A%20CWE-400%20in%20LY%20Corporation%20LINE%20client%20for%20iOS&amp;severity=high&amp;id=69e0825782d89c981f596914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41030-cwe-669-incorrect-resource-transfer-c35faeb6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41030%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Ascensio%20ONLYOFFICE%20DesktopEditors&amp;severity=medium&amp;id=69e0825782d89c981f596917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3581-cwe-862-missing-authorization-in-ian-14ed62cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3581%3A%20CWE-862%20Missing%20Authorization%20in%20iandunn%20Basic%20Google%20Maps%20Placemarks&amp;severity=medium&amp;id=69e077cc82d89c981f4f924c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3773-cwe-89-improper-neutralization-of-sp-7b7b79ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3773%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20onlineada%20Accessibility%20Suite%20by%20Ability%2C%20Inc&amp;severity=medium&amp;id=69e077cc82d89c981f4f9278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3614-cwe-862-missing-authorization-in-acy-936592c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3614%3A%20CWE-862%20Missing%20Authorization%20in%20acyba%20AcyMailing%20%E2%80%93%20An%20Ultimate%20Newsletter%20Plugin%20and%20Marketing%20Automation%20Solution%20for%20WordPress&amp;severity=high&amp;id=69e077cc82d89c981f4f926f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3599-cwe-89-improper-neutralization-of-sp-80174081</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3599%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=high&amp;id=69e077cc82d89c981f4f9266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5050-cwe-347-improper-verification-of-cry-f44f9812</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5050%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20jconti%20Payment%20Gateway%20for%20Redsys%20%26%20WooCommerce%20Lite&amp;severity=high&amp;id=69e077cf82d89c981f4f92a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3551-cwe-79-improper-neutralization-of-in-6127ed29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rafasashi%20Custom%20New%20User%20Notification&amp;severity=medium&amp;id=69e077cc82d89c981f4f9239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3595-cwe-862-missing-authorization-in-imp-ae1beb14</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3595%3A%20CWE-862%20Missing%20Authorization%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=medium&amp;id=69e077cc82d89c981f4f9250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3596-cwe-862-missing-authorization-in-imp-80944579</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3596%3A%20CWE-862%20Missing%20Authorization%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=critical&amp;id=69e077cc82d89c981f4f9259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22619-vulnerability-in-eaton-ipp-software-16180eb8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22619%3A%20Vulnerability%20in%20Eaton%20IPP%20software&amp;severity=high&amp;id=69e077cc82d89c981f4f9236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22618-cwe-358-improperly-implemented-secu-cf580bd1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22618%3A%20CWE-358%20Improperly%20implemented%20security%20check%20for%20standard%20in%20Eaton%20IPP%20software&amp;severity=medium&amp;id=69e077cc82d89c981f4f9233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22617-cwe-614-sensitive-cookie-in-https-s-c480a253</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22617%3A%20CWE-614%20Sensitive%20cookie%20in%20HTTPS%20session%20without%20&apos;secure&apos;%20attribute%20in%20Eaton%20IPP%20Software&amp;severity=medium&amp;id=69e077cc82d89c981f4f9230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22616-cwe-307-improper-restriction-of-exc-cae52f06</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22616%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20Eaton%20IPP%20Software&amp;severity=medium&amp;id=69e06d5282d89c981f32f34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22615-cwe-20-improper-input-validation-in-d8d9bd6d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22615%3A%20CWE-20%20Improper%20input%20validation%20in%20Eaton%20IPP%20Software&amp;severity=medium&amp;id=69e06d5282d89c981f32f34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40118-incorrectly-specified-destination-i-7da8b7a7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40118%3A%20Incorrectly%20specified%20destination%20in%20a%20communication%20channel%20in%20Arcserve%20UDP%20Console&amp;severity=medium&amp;id=69e06d5282d89c981f32f352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5070-cwe-79-improper-neutralization-of-in-86851c8e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5070%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siteorigin%20Vantage&amp;severity=medium&amp;id=69e05f2f82d89c981f1f01cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3878-cwe-79-improper-neutralization-of-in-fb75070d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20WP%20Docs&amp;severity=medium&amp;id=69e05f2f82d89c981f1f01c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4032-cwe-79-improper-neutralization-of-in-838a1846</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kpumuk%20CodeColorer&amp;severity=medium&amp;id=69e05f2f82d89c981f1f01c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6351-cwe-93-improper-neutralization-of-cr-9661b33d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6351%3A%20CWE-93%20Improper%20neutralization%20of%20CRLF%20sequences%20(&apos;CRLF%20injection&apos;)%20in%20Openfind%20MailGates&amp;severity=high&amp;id=69e04d9c82d89c981f080c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41015-cwe-78-improper-neutralization-of-s-9268043e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41015%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radare%20radare2&amp;severity=high&amp;id=69e04d9c82d89c981f080c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6350-cwe-121-stack-based-buffer-overflow--d51a62db</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6350%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20Openfind%20MailGates&amp;severity=critical&amp;id=69e04d9c82d89c981f080c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3885-cwe-79-improper-neutralization-of-in-e174da38</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69e04d9c82d89c981f080c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6349-cwe-78-improper-neutralization-of-sp-76bba57a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6349%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20HGiga%20iSherlock-base-4.5&amp;severity=critical&amp;id=69e04d9c82d89c981f080c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3428-cwe-494-download-of-code-without-int-26258474</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3428%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ASUS%20Member%20Center(%E5%8D%8E%E7%A1%95%E5%A4%A7%E5%8E%85)&amp;severity=medium&amp;id=69e04d9c82d89c981f080c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1880-cwe-367-time-of-check-time-of-use-to-1419a365</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1880%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20ASUS%20DriverHub&amp;severity=medium&amp;id=69e04d9c82d89c981f080c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-16th-2026-httpsis-4e785520</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%2016th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9894%2C%20(Thu%2C%20Apr%2016th)&amp;severity=medium&amp;id=69e0431082d89c981f00a466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6348-cwe-306-missing-authentication-for-c-2cb15b3d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6348%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Simopro%20Technology%20WinMatrix&amp;severity=critical&amp;id=69e04d9c82d89c981f080c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3299-cwe-79-improper-neutralization-of-in-00f10b35</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3299%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20futtta%20WP%20YouTube%20Lyte&amp;severity=medium&amp;id=69e03f8c82d89c981fff3a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40505-cwe-150-improper-neutralization-of--b7f1cec7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40505%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Artifex%20Software%20Inc.%20MuPDF&amp;severity=medium&amp;id=69e03f8c82d89c981fff3a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40504-cwe-122-heap-based-buffer-overflow--7b35deb9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40504%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20marcobambini%20gravity&amp;severity=critical&amp;id=69e03f8c82d89c981fff3a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40502-cwe-862-missing-authorization-in-hk-1a5016b6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40502%3A%20CWE-862%20Missing%20Authorization%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e0388582d89c981fe55b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40503-cwe-22-improper-limitation-of-a-pat-3b442db8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40503%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e0388582d89c981fe55b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-17-acac79e1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-17&amp;severity=medium&amp;id=69e21a1f82d89c981fcfb12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-16-957528d6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-16&amp;severity=medium&amp;id=69e17bea82d89c981fe59751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37100-na-83e19342</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37100%3A%20n%2Fa&amp;severity=medium&amp;id=69e107ef82d89c981f9dd1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37347-na-0e02ab98</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37347%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6982d89c981f97e31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37346-na-f05890a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37346%3A%20n%2Fa&amp;severity=medium&amp;id=69e0fd6982d89c981f97e318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37345-na-9f6b0dc7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37345%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6982d89c981f97e313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37344-na-260a4c1a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37344%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37343-na-f53e37eb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37343%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37342-na-2ee2645c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37342%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37341-na-f0dfe489</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37341%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37340-na-a90f9964</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37340%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6682d89c981f97e29e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37339-na-e993110f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37339%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6682d89c981f97e29b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37338-na-4930560d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37338%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6682d89c981f97e298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37337-na-30fec7c9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37337%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37336-na-8799e560</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37336%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30656-na-0ee1621e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30656%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30459-na-928f9818</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30459%3A%20n%2Fa&amp;severity=high&amp;id=69e0f2f482d89c981f919951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-16-211f6192</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-16&amp;severity=low&amp;id=69e06d3782d89c981f3256c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5363-cwe-326-inadequate-encryption-streng-e67227b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5363%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20TP-Link%20Systems%20Inc.%20Archer%20C7%20v5%20and%20v5.8&amp;severity=medium&amp;id=69e0271282d89c981fac389c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4880-cwe-269-improper-privilege-managemen-a28ccef6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4880%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ukrsolution%20Barcode%20Scanner%20(%2BMobile%20App)%20%E2%80%93%20Inventory%20manager%2C%20Order%20fulfillment%20system%2C%20POS%20(Point%20of%20Sale)&amp;severity=critical&amp;id=69e01ffb82d89c981fa83038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40193-cwe-90-improper-neutralization-of-s-daa16910</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40193%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20foxcpp%20maddy&amp;severity=high&amp;id=69e01ffb82d89c981fa83030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40947-cwe-426-untrusted-search-path-in-yu-5b9a0d86</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40947%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Yubico%20libfido2&amp;severity=low&amp;id=69e01ffb82d89c981fa83035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40192-cwe-770-allocation-of-resources-wit-c6717f27</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40192%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20python-pillow%20Pillow&amp;severity=high&amp;id=69e01c6582d89c981fa691af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40316-cwe-94-improper-control-of-generati-262d4fe9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40316%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OWASP-BLT%20BLT&amp;severity=high&amp;id=69e018e182d89c981fa55552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4949-cwe-862-missing-authorization-in-pro-c72eecd1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4949%3A%20CWE-862%20Missing%20Authorization%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=69e0c29882d89c981f78d924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6388-insufficient-granularity-of-access-c-fbeba818</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6388%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20GitOps&amp;severity=critical&amp;id=69e00aeb82d89c981f9f944b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1711-cwe-79-improper-neutralization-of-in-a6f1d39f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1711%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69e0074d82d89c981f9e1a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1564-cwe-80-improper-neutralization-of-sc-141c02ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1564%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script%20Related%20HTML%20Tags%20in%20a%20Web%20Page%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69e0074d82d89c981f9e1a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22676-cwe-732-incorrect-permission-assign-a3f7b3d2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22676%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Barracuda%20Networks%20RMM&amp;severity=high&amp;id=69dffcc482d89c981f9a5a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40173-cwe-200-exposure-of-sensitive-infor-65dfad21</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40173%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69dffcc482d89c981f9a5a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40186-cwe-79-improper-neutralization-of-i-da6eb63e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40186%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dff5b982d89c981f9734d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39857-cwe-200-exposure-of-sensitive-infor-77d7fde2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39857%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dfeeb382d89c981f942281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35569-cwe-79-improper-neutralization-of-i-cf7e3ec0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35569%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apostrophecms%20apostrophe&amp;severity=high&amp;id=69dfeeb382d89c981f94227d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33889-cwe-79-improper-neutralization-of-i-6ee4b412</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33889%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dfeeb382d89c981f942279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33888-cwe-863-incorrect-authorization-in--35d4ea2d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33888%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dfeeb382d89c981f942274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21726-vulnerability-in-grafana-loki-8cebd2e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21726%3A%20Vulnerability%20in%20Grafana%20Loki&amp;severity=medium&amp;id=69dfeeb382d89c981f942271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6385-integer-overflow-or-wraparound-in-re-80c34cf6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6385%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Lightspeed%20Core&amp;severity=medium&amp;id=69dfe7c182d89c981f913eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41118-vulnerability-in-grafana-pyroscope-a9a6cd4c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41118%3A%20Vulnerability%20in%20Grafana%20Pyroscope&amp;severity=critical&amp;id=69dfe7b682d89c981f913c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33877-cwe-208-observable-timing-discrepan-455d361c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33877%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20apostrophecms%20apostrophe&amp;severity=low&amp;id=69dfe7b682d89c981f913c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6384-buffer-copy-without-checking-size-of-180df722</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6384%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=69dfe7be82d89c981f913e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6364-out-of-bounds-read-in-google-chrome-ee9b22e8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6364%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=69dfe7be82d89c981f913e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6319-use-after-free-in-google-chrome-70128cb4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6319%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6318-use-after-free-in-google-chrome-647ef04f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6318%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6363-type-confusion-in-google-chrome-778cc2b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6363%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6317-use-after-free-in-google-chrome-6551e6e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6317%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6362-use-after-free-in-google-chrome-418d3b95</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6362%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=69dfe7be82d89c981f913e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6361-heap-buffer-overflow-in-google-chrom-ed6c176c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6361%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6316-use-after-free-in-google-chrome-cc03a7ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6316%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6315-use-after-free-in-google-chrome-50d74272</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6315%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6314-out-of-bounds-write-in-google-chrome-2215667b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6314%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6313-insufficient-policy-enforcement-in-g-06ed9486</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6313%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=low&amp;id=69dfe7bc82d89c981f913de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6312-insufficient-policy-enforcement-in-g-6255dea0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6312%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=low&amp;id=69dfe7bc82d89c981f913de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6311-uninitialized-use-in-google-chrome-2d3a856f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6311%3A%20Uninitialized%20Use%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6310-use-after-free-in-google-chrome-484f6da9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6310%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6360-use-after-free-in-google-chrome-d3ebcedf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6360%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6309-use-after-free-in-google-chrome-d73ce66a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6309%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6308-out-of-bounds-read-in-google-chrome-168f3bc3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6308%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6307-type-confusion-in-google-chrome-57982440</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6307%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6306-heap-buffer-overflow-in-google-chrom-06f9de62</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6306%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6305-heap-buffer-overflow-in-google-chrom-df697c78</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6305%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6304-use-after-free-in-google-chrome-2d9bad9b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6304%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6303-use-after-free-in-google-chrome-c3150b44</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6303%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6302-use-after-free-in-google-chrome-df0b9544</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6302%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6301-type-confusion-in-google-chrome-6e9014de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6301%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6300-use-after-free-in-google-chrome-d818b9fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6300%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6359-use-after-free-in-google-chrome-b470779c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6359%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6358-use-after-free-in-google-chrome-d445e92b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6358%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6299-use-after-free-in-google-chrome-b43675e1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6299%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6298-heap-buffer-overflow-in-google-chrom-4814b240</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6298%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69dfe7b982d89c981f913cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6297-use-after-free-in-google-chrome-aec32456</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6297%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b682d89c981f913c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6296-heap-buffer-overflow-in-google-chrom-7fb66fda</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6296%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=critical&amp;id=69dfe7b682d89c981f913c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40919-out-of-bounds-write-in-red-hat-red--99c9240b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40919%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40918-incorrect-calculation-of-buffer-siz-7e419a48</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40918%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40917-out-of-bounds-read-in-red-hat-red-h-b32d4ab9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40917%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40916-out-of-bounds-write-in-red-hat-red--f6a28f76</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40916%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40915-integer-overflow-or-wraparound-in-r-da9bffb8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40915%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21727-vulnerability-in-grafana-grafana-co-e8f95c9c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21727%3A%20Vulnerability%20in%20Grafana%20Grafana%20Correlations&amp;severity=low&amp;id=69dfe7b682d89c981f913c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5189-cwe-798-use-of-hard-coded-credential-1496b711</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5189%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Sonatype%20Nexus%20Repository&amp;severity=critical&amp;id=69dfe0a382d89c981f8dffa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33667-cwe-307-improper-restriction-of-exc-7202229d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33667%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20opf%20openproject&amp;severity=high&amp;id=69dfe0a382d89c981f8dff94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40256-cwe-22-improper-limitation-of-a-pat-021af117</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40256%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfe0a382d89c981f8dff9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34632-cwe-427-uncontrolled-search-path-el-f84269c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34632%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Adobe%20Adobe%20Photoshop%20Installer&amp;severity=high&amp;id=69dfe0a382d89c981f8dff97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6245-buffer-access-with-incorrect-length--3f4db62e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6245%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69dfe0a382d89c981f8dffa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39845-cwe-918-server-side-request-forgery-d91487e0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39845%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfe0a382d89c981f8dff9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34393-cwe-269-improper-privilege-manageme-05526187</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34393%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69dfd9a582d89c981f8a79e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34244-cwe-200-exposure-of-sensitive-infor-a0c0c367</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34244%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6383-incorrect-authorization-in-red-hat-r-194df434</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6383%3A%20Incorrect%20Authorization%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Virtualization%204&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34242-cwe-22-improper-limitation-of-a-pat-6f9f4f5e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34242%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69dfd9a582d89c981f8a79df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33440-cwe-918-server-side-request-forgery-7310feef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33440%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33435-cwe-23-relative-path-traversal-in-w-8a812be9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33435%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69dfd9a582d89c981f8a79d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4857-cwe-863-incorrect-authorization-in-s-b29d7e7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4857%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SailPoint%20Technologies%20IdentityIQ&amp;severity=high&amp;id=69dfd9a582d89c981f8a79eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33220-cwe-22-improper-limitation-of-a-pat-206cb2f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33220%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33214-cwe-862-missing-authorization-in-we-09b74691</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33214%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd29182d89c981f86fbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33212-cwe-284-improper-access-control-in--d4da3688</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33212%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=69dfd29182d89c981f86fbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spotting-cyberthreats-a-guide-for-blind-and-low-vi-a2afe435</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spotting%20cyberthreats%3A%20a%20guide%20for%20blind%20and%20low-vision%20users%20%7C%20Kaspersky%20official%20blog&amp;severity=low&amp;id=69dfcf2182d89c981f8542bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6290-cwe-863-in-rapid7-velociraptor-16ce8299</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6290%3A%20CWE-863%20in%20Rapid7%20Velociraptor&amp;severity=high&amp;id=69dfcf1982d89c981f85412e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32631-cwe-200-exposure-of-sensitive-infor-535ad14c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32631%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20git-for-windows%20git&amp;severity=high&amp;id=69dfcf1982d89c981f854123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5758-cwe-200-exposure-of-sensitive-inform-05642342</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5758%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Mafintosh%20Protocol-buffers-schema%20parser&amp;severity=medium&amp;id=69dfcf1982d89c981f85412a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-crypto-wallet-takeover-unlimited-usdt-appro-80de48d7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Crypto%20Wallet%20Takeover%20Unlimited%20USDT%20Approval%20Exploitation%20via%20Trust%20Wallet%20QR%20Code%20Phishing&amp;severity=medium&amp;id=69dfcba782d89c981f83460d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-youtube-copyright-notices-can-steal-your-goog-4259ffad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20YouTube%20copyright%20notices%20can%20steal%20your%20Google%20login&amp;severity=medium&amp;id=69dfc80282d89c981f7dd9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sweden-blames-pro-russian-group-for-cyberattack-la-83236afa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sweden%20Blames%20Pro-Russian%20Group%20for%20Cyberattack%20Last%20Year%20on%20Its%20Energy%20Infrastructure&amp;severity=medium&amp;id=69dfc0fc82d89c981f74ea7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15610-cwe-502-deserialization-of-untruste-8e29d51c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15610%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20OpenText%2C%20Inc%20RightFax&amp;severity=critical&amp;id=69dfc10382d89c981f750b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63029-cwe-89-improper-neutralization-of-s-00805d70</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63029%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WC%20Lovers%20WCFM%20Marketplace&amp;severity=high&amp;id=69dfc10382d89c981f750b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6372-cwe-862-missing-authorization-in-pli-a5a0a62f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6372%3A%20CWE-862%20Missing%20Authorization%20in%20Plisio%20Accept%20Cryptocurrencies%20with%20Plisio&amp;severity=high&amp;id=69dfc10382d89c981f750b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-fake-proton-vpn-sites-to-gaming-mods-this-win-37383ac0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20fake%20Proton%20VPN%20sites%20to%20gaming%20mods%2C%20this%20Windows%20infostealer%20is%20everywhere&amp;severity=medium&amp;id=69dfcba782d89c981f834603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20136-improper-encoding-or-escaping-of-ou-f5759eaa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20136%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20059-improper-neutralization-of-input-du-294c602d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20061-improper-neutralization-of-special--d2f61c7d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20061%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20060-url-redirection-to-untrusted-site-o-28f4102f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20060%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20170-improper-neutralization-of-script-r-0491a1ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20170%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Webex%20Contact%20Center&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20184-improper-certificate-validation-in--c47eb2ce</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20184%3A%20Improper%20Certificate%20Validation%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=critical&amp;id=69dfb9f882d89c981f6ee6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20180-improper-limitation-of-a-pathname-t-7c0f2b38</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20180%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69dfb9f882d89c981f6ee6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20152-authentication-bypass-by-primary-we-7ab53c44</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20152%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Cisco%20Cisco%20Secure%20Web%20Appliance&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20161-improper-link-resolution-before-fil-285f4f28</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20161%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Cisco%20Cisco%20ThousandEyes%20Enterprise%20Agent&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20186-improper-neutralization-of-special--fe838f1c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20186%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69dfb9f882d89c981f6ee6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20148-improper-limitation-of-a-pathname-t-77613593</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20148%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20147-improper-neutralization-of-special--69d7d44e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20147%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69dfb9f682d89c981f6ee687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20081-relative-path-traversal-in-cisco-ci-ca9c26bb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20081%3A%20Relative%20Path%20Traversal%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20078-relative-path-traversal-in-cisco-ci-32eb30c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20078%3A%20Relative%20Path%20Traversal%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20132-improper-neutralization-of-input-du-851bc956</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20132%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6370-cwe-79-improper-neutralization-of-in-d5a504fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6370%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HashThemes%20Mini%20Ajax%20Cart%20for%20WooCommerce&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15636-cwe-79-improper-neutralization-of-i-88c38273</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20YouTube%20Showcase&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15635-cwe-352-cross-site-request-forgery--3a3da392</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15635%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZAYTECH%20Smart%20Online%20Order%20for%20Clover&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53444-cwe-352-cross-site-request-forgery--55989ef9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53444%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DeluxeThemes%20Userpro&amp;severity=medium&amp;id=69dfb67782d89c981f6a459c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5387-cwe-862-in-aveva-pipeline-simulation-929b8708</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5387%3A%20CWE-862%20in%20AVEVA%20Pipeline%20Simulation%202025&amp;severity=critical&amp;id=69dfb67782d89c981f6a45a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20205-information-written-to-log-files-ca-c01d3c95</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20205%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20MCP%20Server&amp;severity=high&amp;id=69dfaf6882d89c981f612b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20203-the-software-does-not-restrict-or-i-356224a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20203%3A%20The%20software%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69dfaf6882d89c981f612b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20204-creating-and-using-insecure-tempora-f5cdc3ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20204%3A%20Creating%20and%20using%20insecure%20temporary%20files%20can%20leave%20application%20and%20system%20data%20vulnerable%20to%20attack.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69dfaf6882d89c981f612b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20202-the-software-does-not-properly-hand-a86b1619</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20202%3A%20The%20software%20does%20not%20properly%20handle%20when%20an%20input%20contains%20Unicode%20encoding.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69dfaf6882d89c981f612b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-n8n-n8mare-how-threat-actors-are-misusing-ai-w-78030375</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20n8n%20n8mare%3A%20How%20threat%20actors%20are%20misusing%20AI%20workflow%20automation&amp;severity=medium&amp;id=69dfcba782d89c981f8345f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ransomware-targets-turkey-via-adwind-rat-840bf63c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ransomware%20targets%20Turkey%20via%20Adwind%20RAT&amp;severity=medium&amp;id=69dfb66f82d89c981f6a420e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12141-cwe-200-information-disclosure-in-g-8996e2d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12141%3A%20CWE-200%3A%20Information%20Disclosure%20in%20Grafana%20Grafana%20Alerting&amp;severity=low&amp;id=69dfaf6882d89c981f612b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-mac-stealer-targeting-10k-crypto-wallets-2027ccd4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20Mac%20stealer%20targeting%20%2410K%2B%20crypto%20wallets&amp;severity=medium&amp;id=69dfb2ea82d89c981f6662d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-vulnerability-exposes-nginx-servers-to-h-33c1d10c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20Vulnerability%20Exposes%20Nginx%20Servers%20to%20Hacking&amp;severity=critical&amp;id=69dfa4dc82d89c981f4d965c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4682-cwe-121-stack-based-buffer-overflow--e9f0af64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4682%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20HP%20Inc%20HP%20DeskJet%202800e%20All-in-One%20Printer%20series&amp;severity=high&amp;id=69dfa86082d89c981f539bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4667-cwe-250-execution-with-unnecessary-p-749e3fc7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4667%3A%20CWE-250%20Execution%20with%20unnecessary%20privileges%20in%20HP%20Inc.%20OMEN%20Gaming%20Hub&amp;severity=high&amp;id=69dfa86082d89c981f539bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/capsule-security-emerges-from-stealth-with-7-milli-2250a1fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Capsule%20Security%20Emerges%20From%20Stealth%20With%20%247%20Million%20in%20Funding&amp;severity=medium&amp;id=69df9a5082d89c981f38985c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/by-design-flaw-in-mcp-could-enable-widespread-ai-s-5fc67ebf</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98By%20Design%E2%80%99%20Flaw%20in%20MCP%20Could%20Enable%20Widespread%20AI%20Supply%20Chain%20Attacks&amp;severity=low&amp;id=69df96cc82d89c981f30469f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/100-chrome-extensions-steal-user-data-create-backd-7c4e8817</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=100%20Chrome%20Extensions%20Steal%20User%20Data%2C%20Create%20Backdoor&amp;severity=medium&amp;id=69df934882d89c981f291bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ciso-conversations-ross-mckerchar-ciso-at-sophos-d4cf0ac2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISO%20Conversations%3A%20Ross%20McKerchar%2C%20CISO%20at%20Sophos&amp;severity=medium&amp;id=69dfb6c182d89c981f6adf90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25219-cwe-200-exposure-of-sensitive-infor-fd73ca6d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25219%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69df88bc82d89c981f17bd58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4145-cwe-88-improper-neutralization-of-ar-2139207c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4145%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Software%20Fix&amp;severity=high&amp;id=69df88bc82d89c981f17bd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4135-cwe-59-improper-link-resolution-befo-04d17efd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4135%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Lenovo%20Software%20Fix&amp;severity=medium&amp;id=69df88bc82d89c981f17bd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4134-cwe-427-uncontrolled-search-path-ele-29084f0b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4134%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20Software%20Fix&amp;severity=high&amp;id=69df88bc82d89c981f17bd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1636-cwe-427-uncontrolled-search-path-ele-54c44a16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1636%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20Service%20Bridge&amp;severity=medium&amp;id=69df88bc82d89c981f17bd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0827-cwe-59-improper-link-resolution-befo-2f40ea17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0827%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Lenovo%20Diagnostics&amp;severity=medium&amp;id=69df88bc82d89c981f17bd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mirax-rat-targeting-android-users-in-europe-af1aa70b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mirax%20RAT%20Targeting%20Android%20Users%20in%20Europe&amp;severity=medium&amp;id=69df81b482d89c981f0e2b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-vulnerabilities-patched-in-ivanti-neurons-for--9bbfd3ef</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Vulnerabilities%20Patched%20in%20Ivanti%20Neurons%20for%20ITSM&amp;severity=low&amp;id=69df7aac82d89c981ffeb537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1852-cwe-352-cross-site-request-forgery-c-da2bdb61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1852%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20woobeewoo%20Product%20Pricing%20Table%20by%20WooBeWoo&amp;severity=medium&amp;id=69df7ad282d89c981fff5f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-domain-could-have-handed-hackers-25k-endpoints--8d5021f7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2410%20Domain%20Could%20Have%20Handed%20Hackers%2025k%20Endpoints%2C%20Including%20in%20OT%20and%20Gov%20Networks&amp;severity=medium&amp;id=69df702082d89c981feb85ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30778-cwe-202-exposure-of-sensitive-infor-b8fdce1f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30778%3A%20CWE-202%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20Apache%20Software%20Foundation%20Apache%20SkyWalking&amp;severity=high&amp;id=69df703082d89c981fec17be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trump-urges-extending-foreign-surveillance-program-b2cdc3b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trump%20Urges%20Extending%20Foreign%20Surveillance%20Program%20as%20Some%20Lawmakers%20Push%20for%20US%20Privacy%20Protections&amp;severity=medium&amp;id=69df691882d89c981fdff00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40786-missing-authorization-in-long-watch-21ffcda2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40786%3A%20Missing%20Authorization%20in%20Long%20Watch%20Studio%20MyRewards&amp;severity=medium&amp;id=69df6ca082d89c981fe573b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40784-authorization-bypass-through-user-c-0d8e9d5d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40784%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mahmudul%20Hasan%20Arif%20FluentBoards&amp;severity=high&amp;id=69df6ca082d89c981fe573b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40764-cross-site-request-forgery-csrf-in--fe9b06a5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40764%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=high&amp;id=69df6c9d82d89c981fe572fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40763-missing-authorization-in-wp-royal-r-ec477ac2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40763%3A%20Missing%20Authorization%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=medium&amp;id=69df6c9d82d89c981fe572f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40745-improper-neutralization-of-special--dc1439ea</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40745%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons&amp;severity=high&amp;id=69df6c9d82d89c981fe572f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40742-missing-authorization-in-nelio-soft-356877bd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40742%3A%20Missing%20Authorization%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=medium&amp;id=69df6c9d82d89c981fe572f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40740-missing-authorization-in-themeum-tu-ca37fc88</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40740%3A%20Missing%20Authorization%20in%20Themeum%20Tutor%20LMS&amp;severity=medium&amp;id=69df6c9d82d89c981fe572f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40737-authorization-bypass-through-user-c-1c7de437</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40737%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20VillaTheme%20COMPE&amp;severity=medium&amp;id=69df6c9d82d89c981fe572ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40734-improper-neutralization-of-input-du-5fd327d0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zahlan%20Categories%20Images&amp;severity=medium&amp;id=69df6c9d82d89c981fe572ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40730-missing-authorization-in-themegrill-046aebce</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40730%3A%20Missing%20Authorization%20in%20ThemeGrill%20ThemeGrill%20Demo%20Importer&amp;severity=medium&amp;id=69df6c9d82d89c981fe572e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40729-missing-authorization-in-bplugins-3-72f54865</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40729%3A%20Missing%20Authorization%20in%20bPlugins%203D%20viewer%20%E2%80%93%20Embed%203D%20Models&amp;severity=medium&amp;id=69df6c9d82d89c981fe572e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40728-missing-authorization-in-blockart-m-cc1c2b87</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40728%3A%20Missing%20Authorization%20in%20BlockArt%20Magazine%20Blocks&amp;severity=medium&amp;id=69df6c9d82d89c981fe572e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33807-cwe-436-interpretation-conflict-in--e2fb5055</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33807%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20fastify%20%40fastify%2Fexpress&amp;severity=critical&amp;id=69df621082d89c981fd4ed1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33618-cwe-400-uncontrolled-resource-consu-7254c62d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33618%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Bosch%20BVMS&amp;severity=high&amp;id=69df621082d89c981fd4ed18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-fortisandbox-vulnerabili-634b7980</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20FortiSandbox%20Vulnerabilities&amp;severity=critical&amp;id=69df5e8c82d89c981fce644e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33808-cwe-436-interpretation-conflict-in--328b2649</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33808%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20fastify%20%40fastify%2Fexpress&amp;severity=critical&amp;id=69df621082d89c981fd4ed20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chasing-an-angry-spark-3c7d252d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chasing%20an%20Angry%20Spark&amp;severity=medium&amp;id=69dfcba782d89c981f8345df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3505-cwe-770-allocation-of-resources-with-d473995c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3505%3A%20CWE-770%20Allocation%20of%20resources%20without%20limits%20or%20throttling%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=high&amp;id=69df5b0f82d89c981fca1f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5588-cwe-327-use-of-a-broken-or-risky-cry-873364df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5588%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=medium&amp;id=69df5b0f82d89c981fca1f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5598-cwe-385-covert-timing-channel-in-leg-bc1f0a9b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5598%3A%20CWE-385%20Covert%20timing%20channel%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=high&amp;id=69df5b0f82d89c981fca1f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0636-cwe-90-improper-neutralization-of-sp-cfb737a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0636%3A%20CWE-90%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20LDAP%20query%20(&apos;LDAP%20injection&apos;)%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=medium&amp;id=69df5b0f82d89c981fca1f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14813-cwe-327-use-of-a-broken-or-risky-cr-dcd827cc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14813%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=critical&amp;id=69df5b0f82d89c981fca1f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52641-vulnerability-in-hcl-aion-64bbe7c4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52641%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69df540182d89c981fbdb3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3643-cwe-79-improper-neutralization-of-in-68c05e6e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onthemapmarketing%20Accessibly%20%E2%80%93%20WordPress%20Website%20Accessibility&amp;severity=high&amp;id=69df540182d89c981fbdb3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4011-cwe-79-improper-neutralization-of-in-7e0088fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4011%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgwyer%20Power%20Charts%20%E2%80%93%20Responsive%20Beautiful%20Charts%20%26%20Graphs&amp;severity=medium&amp;id=69df540482d89c981fbdb58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3998-cwe-79-improper-neutralization-of-in-c6990476</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3998%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webmindpt%20WM%20JqMath&amp;severity=medium&amp;id=69df540182d89c981fbdb400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1782-cwe-20-improper-input-validation-in--eeab536b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1782%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Wpmet%20MetForm%20Pro&amp;severity=medium&amp;id=69df540182d89c981fbdb3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3649-cwe-862-missing-authorization-in-col-aa0e913c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3649%3A%20CWE-862%20Missing%20Authorization%20in%20colbeinformatik%20Katalogportal-pdf-sync%20Widget&amp;severity=medium&amp;id=69df540182d89c981fbdb3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4091-cwe-352-cross-site-request-forgery-c-040ecd99</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4091%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20faridsaniee%20OPEN-BRAIN&amp;severity=medium&amp;id=69df540482d89c981fbdb595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3461-cwe-288-authentication-bypass-using--9f822f26</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3461%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20visaacceptancesolutions%20Visa%20Acceptance%20Solutions&amp;severity=critical&amp;id=69df540182d89c981fbdb3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3642-cwe-862-missing-authorization-in-for-b375c293</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3642%3A%20CWE-862%20Missing%20Authorization%20in%20forfront%20e-shot&amp;severity=medium&amp;id=69df540182d89c981fbdb3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4005-cwe-79-improper-neutralization-of-in-e039b1ad</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4005%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coachific%20Coachific%20Shortcode&amp;severity=medium&amp;id=69df540482d89c981fbdb587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4002-cwe-352-cross-site-request-forgery-c-5683203e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4002%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20petjeaf%20Petje.af&amp;severity=medium&amp;id=69df540482d89c981fbdb57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3659-cwe-79-improper-neutralization-of-in-ae3b6448</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3659%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bappidgreat%20WP%20Circliful&amp;severity=medium&amp;id=69df540182d89c981fbdb3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40899-cwe-79-improper-neutralization-of-i-1ebcb453</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40899%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=69df540182d89c981fbdb3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40897-cwe-863-incorrect-authorization-in--1c69b20c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40897%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=69df540182d89c981fbdb3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5694-cwe-79-improper-neutralization-of-in-5e6ec16b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5694%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aerin%20Quick%20Interest%20Slider&amp;severity=high&amp;id=69df733482d89c981ff25ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5617-cwe-639-authorization-bypass-through-c449e74b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5617%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20royalnavneet%20Login%20as%20User%20%E2%80%93%20Switch%20User%20%26%20WooCommerce%20Login%20as%20Customer&amp;severity=high&amp;id=69df733482d89c981ff25cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5717-cwe-79-improper-neutralization-of-in-46aa3ef6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5717%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20knighthawk%20VI%3A%20Include%20Post%20By&amp;severity=medium&amp;id=69df733482d89c981ff25cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-8-industrial-giants-publish-new--d3308aef</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%208%20Industrial%20Giants%20Publish%20New%20Security%20Advisories&amp;severity=medium&amp;id=69df3b6482d89c981f8eec0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5088-cwe-338-use-of-cryptographically-wea-16c9eece</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5088%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20JDEGUEST%20Apache%3A%3AAPI%3A%3APassword&amp;severity=high&amp;id=69df426b82d89c981f9c89ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6293-cwe-352-cross-site-request-forgery-c-8623502d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6293%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20udamadu%20Inquiry%20form%20to%20posts%20or%20pages&amp;severity=medium&amp;id=69df37e082d89c981f89f024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5160-cross-site-scripting-xss-in-githubco-45eede9b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5160%3A%20Cross-site%20Scripting%20(XSS)%20in%20github.com%2Fyuin%2Fgoldmark%2Frenderer%2Fhtml&amp;severity=medium&amp;id=69df264b82d89c981f697e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26291-cross-site-scripting-xss-in-growi-i-00b9c4e6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26291%3A%20Cross-site%20scripting%20(XSS)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=69df1bce82d89c981f4dca69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5397-cwe-427-uncontrolled-search-path-ele-1f281f99</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5397%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20OMRON%20SOCIAL%20SOLUTIONS%20CO.%2C%20Ltd.%20PowerAttendant%20Standard%20Edition&amp;severity=high&amp;id=69df1bce82d89c981f4dca6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1555-cwe-434-unrestricted-upload-of-file--be10bbcf</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1555%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Owen%20WebStack&amp;severity=critical&amp;id=69df0daf82d89c981f2a19ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6328-cwe-20-improper-input-validation-in--ad367d4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6328%3A%20CWE-20%20Improper%20input%20validation%20in%20XQUIC%20Project%20XQUIC&amp;severity=high&amp;id=69df0daf82d89c981f2a19d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40499-cwe-78-improper-neutralization-of-s-c450c02e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40499%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radareorg%20radare2&amp;severity=high&amp;id=69defc3b82d89c981ff96336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-15th-2026-httpsi-ba6ef2fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%2015th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9892%2C%20(Wed%2C%20Apr%2015th)&amp;severity=medium&amp;id=69def19182d89c981fe564ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1509-cwe-94-improper-control-of-generatio-77599009</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1509%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=69deee0b82d89c981fde9f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1541-cwe-639-authorization-bypass-through-426c90f5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1541%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=69deee0b82d89c981fde9f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4812-cwe-862-missing-authorization-in-wpe-838ccd66</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4812%3A%20CWE-862%20Missing%20Authorization%20in%20wpengine%20Advanced%20Custom%20Fields%20(ACF%C2%AE)&amp;severity=medium&amp;id=69deee0b82d89c981fde9f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2834-cwe-79-improper-neutralization-of-in-ddccbea9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2834%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tokenoftrust%20Age%20Verification%20%26%20Identity%20Verification%20by%20Token%20of%20Trust&amp;severity=high&amp;id=69deee0b82d89c981fde9f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54550-cwe-94-improper-control-of-generati-3a6749d9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54550%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69dee70482d89c981fce52d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-for-ai-models-tue-apr-14th-f0af681b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20for%20AI%20Models%2C%20(Tue%2C%20Apr%2014th)&amp;severity=medium&amp;id=69dedc7882d89c981f4f4c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40105-cwe-80-improper-neutralization-of-s-7ff39b0b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40105%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=69dee70482d89c981fce52d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40104-cwe-770-allocation-of-resources-wit-de9859be</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40104%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20xwiki%20org.xwiki.platform%3Axwiki-platform-oldcore&amp;severity=medium&amp;id=69ded8f482d89c981f22eddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-16-f3d2223b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-16&amp;severity=medium&amp;id=69e2285782d89c981fe85812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-15-a05f99ea</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-15&amp;severity=medium&amp;id=69e02a6a82d89c981fad373c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30993-na-5eef5dae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30993%3A%20n%2Fa&amp;severity=critical&amp;id=69dfcf1982d89c981f85411f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30995-na-594a4b29</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30995%3A%20n%2Fa&amp;severity=high&amp;id=69dfc80582d89c981f7ddbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30994-na-059d58d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30994%3A%20n%2Fa&amp;severity=high&amp;id=69dfc80582d89c981f7ddbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30996-na-7d1dfe4a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30996%3A%20n%2Fa&amp;severity=high&amp;id=69dfc10382d89c981f750b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30461-na-2320544e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30461%3A%20n%2Fa&amp;severity=high&amp;id=69dfb67782d89c981f6a45a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67841-na-90086889</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67841%3A%20n%2Fa&amp;severity=high&amp;id=69dfb67782d89c981f6a459f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30625-na-5f09f954</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30625%3A%20n%2Fa&amp;severity=critical&amp;id=69dfaf6882d89c981f612b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30624-na-874e93a6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30624%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30617-na-a6d25840</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30617%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30616-na-6a957f7b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30616%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30615-na-cfcaae0f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30615%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30364-na-d86929a4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30364%3A%20n%2Fa&amp;severity=high&amp;id=69dfa86082d89c981f539bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53412-na-b7eb1768</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53412%3A%20n%2Fa&amp;severity=high&amp;id=69dfa86082d89c981f539bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-15-80bc2060</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-15&amp;severity=low&amp;id=69df507382d89c981fb85c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40096-cwe-79-improper-neutralization-of-i-9694f3f4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40096%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20immich-app%20immich&amp;severity=medium&amp;id=69ded8f482d89c981f22edd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40091-cwe-532-insertion-of-sensitive-info-ee619b09</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40091%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20authzed%20spicedb&amp;severity=medium&amp;id=69ded8f482d89c981f22edd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40090-cwe-22-improper-limitation-of-a-pat-c8ab49a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40090%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zarf-dev%20zarf&amp;severity=high&amp;id=69ded57682d89c981f20b4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39984-cwe-295-improper-certificate-valida-1bc99de0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39984%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20sigstore%20timestamp-authority&amp;severity=medium&amp;id=69ded57682d89c981f20b4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39971-cwe-113-improper-neutralization-of--47ba53ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39971%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20s9y%20Serendipity&amp;severity=high&amp;id=69ded57682d89c981f20b4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39963-cwe-565-reliance-on-cookies-without-d37d563e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39963%3A%20CWE-565%3A%20Reliance%20on%20Cookies%20without%20Validation%20and%20Integrity%20Checking%20in%20s9y%20Serendipity&amp;severity=medium&amp;id=69ded57682d89c981f20b4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1314-cwe-862-missing-authorization-in-ibe-155c7412</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1314%3A%20CWE-862%20Missing%20Authorization%20in%20iberezansky%203D%20FlipBook%20%E2%80%93%20PDF%20Embedder%2C%20PDF%20Flipbook%20Viewer%2C%20Flipbook%20Image%20Gallery&amp;severity=medium&amp;id=69dece6882d89c981f1bf9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2396-cwe-79-improper-neutralization-of-in-cb40c8a9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kimipooh%20List%20View%20Google%20Calendar&amp;severity=medium&amp;id=69dece6882d89c981f1bf9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15470-cwe-22-improper-limitation-of-a-pat-f1f9ed0c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15470%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DesigningMedia%20Eleganzo&amp;severity=medium&amp;id=69dece6882d89c981f1bf9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39884-cwe-88-improper-neutralization-of-a-0e46c7ee</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39884%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Flux159%20mcp-server-kubernetes&amp;severity=high&amp;id=69dece6882d89c981f1bf9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39399-cwe-20-improper-input-validation-in-f5d85126</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39399%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20NuGet%20NuGetGallery&amp;severity=critical&amp;id=69decae882d89c981f18b33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27297-integer-underflow-wrap-or-wraparoun-b9acb282</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27297%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27300-access-of-uninitialized-pointer-cwe-304f0a0a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27300%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=69decae582d89c981f18b2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27296-integer-underflow-wrap-or-wraparoun-992b6cdb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27296%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27290-untrusted-search-path-cwe-426-in-ad-f194852f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27290%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27298-access-of-resource-using-incompatib-860e7c92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27298%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20(CWE-843)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27294-out-of-bounds-read-cwe-125-in-adobe-e15e9d93</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27294%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27295-out-of-bounds-write-cwe-787-in-adob-53061293</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27295%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27301-heap-based-buffer-overflow-cwe-122--828495a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27301%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=69decae882d89c981f18b33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27299-improper-input-validation-cwe-20-in-d362f7f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27299%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=69decae582d89c981f18b2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27293-heap-based-buffer-overflow-cwe-122--2afa605c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27293%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27292-use-after-free-cwe-416-in-adobe-ado-2db526ee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27292%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35589-cwe-1385-missing-origin-validation--cb68aa18</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35589%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20HKUDS%20nanobot&amp;severity=high&amp;id=69dec76b82d89c981f15e829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33414-cwe-78-improper-neutralization-of-s-cc0c50f6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33414%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20containers%20podman&amp;severity=medium&amp;id=69dec76b82d89c981f15e825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40688-execute-unauthorized-code-or-comman-bd6906da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40688%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69dec76b82d89c981f15e82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33023-cwe-416-use-after-free-in-saitoha-l-125281c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33023%3A%20CWE-416%3A%20Use%20After%20Free%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69debcd482d89c981f0dfd18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33021-cwe-416-use-after-free-in-saitoha-l-76a24acb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33021%3A%20CWE-416%3A%20Use%20After%20Free%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69debcd482d89c981f0dfd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34619-improper-limitation-of-a-pathname-t-f76b20d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34619%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b1a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27308-uncontrolled-resource-consumption-c-bfe4703f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27308%3A%20Uncontrolled%20Resource%20Consumption%20(CWE-400)%20in%20Adobe%20ColdFusion&amp;severity=low&amp;id=69deb96d82d89c981f0b1a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27282-improper-input-validation-cwe-20-in-bd70f457</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27282%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b19f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27305-improper-limitation-of-a-pathname-t-1553d8cb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27305%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b19fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27304-improper-input-validation-cwe-20-in-1237c730</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27304%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=69deb96d82d89c981f0b19fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27306-improper-input-validation-cwe-20-in-a1295e82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27306%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b1a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27307-uncontrolled-resource-consumption-c-0de89358</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27307%3A%20Uncontrolled%20Resource%20Consumption%20(CWE-400)%20in%20Adobe%20ColdFusion&amp;severity=low&amp;id=69deb96d82d89c981f0b1a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33020-cwe-122-heap-based-buffer-overflow--12ac4054</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33020%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69deb96d82d89c981f0b1a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33019-cwe-125-out-of-bounds-read-in-saito-51d22ad7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33019%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69deb96d82d89c981f0b1a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33018-cwe-416-use-after-free-in-saitoha-l-56970cc6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33018%3A%20CWE-416%3A%20Use%20After%20Free%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69deb96d82d89c981f0b1a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40291-cwe-269-improper-privilege-manageme-2c622c0b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40291%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deb97082d89c981f0b1a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35196-cwe-78-improper-neutralization-of-s-ff921618</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35196%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deb5cc82d89c981f06f4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34602-cwe-639-authorization-bypass-throug-a0532f99</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34602%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deb5cc82d89c981f06f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15565-cwe-862-missing-authorization-in-ca-8c9d9668</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15565%3A%20CWE-862%20Missing%20Authorization%20in%20cartasi%20Nexi%20XPay&amp;severity=medium&amp;id=69deb5cc82d89c981f06f4c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34370-cwe-285-improper-authorization-in-c-f70cafa6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34370%3A%20CWE-285%3A%20Improper%20Authorization%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69deb5cc82d89c981f06f4c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39907-cwe-73-external-control-of-file-nam-baea18b5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39907%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Unisys%20WebPerfect%20Image%20Suite&amp;severity=high&amp;id=69deb5cc82d89c981f06f4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39906-cwe-441-unintended-proxy-or-interme-ff8fdb0c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39906%3A%20CWE-441%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20Unisys%20WebPerfect%20Image%20Suite&amp;severity=high&amp;id=69deb5cc82d89c981f06f4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34631-out-of-bounds-write-cwe-787-in-adob-a620ceb9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34631%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69deb5cc82d89c981f06f4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34161-cwe-79-improper-neutralization-of-i-b1414ebb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34161%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69deaedd82d89c981f01938a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34160-cwe-306-missing-authentication-for--293e1607</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34160%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deaedd82d89c981f019385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33715-cwe-306-missing-authentication-for--8c8fe980</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33715%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deaedd82d89c981f019381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33714-cwe-89-improper-neutralization-of-s-ac72effa</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33714%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deaedd82d89c981f01937d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27287-out-of-bounds-read-cwe-125-in-adobe-6398376a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27287%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69deab4182d89c981ffdeb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25133-cwe-79-improper-neutralization-of-i-aa387956</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25133%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=69deab4182d89c981ffdeb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25125-cwe-200-exposure-of-sensitive-infor-e22a1d73</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25125%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20octobercms%20october&amp;severity=medium&amp;id=69deab4182d89c981ffdeb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40683-cwe-843-access-of-resource-using-in-9348968e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40683%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20OpenStack%20Keystone&amp;severity=high&amp;id=69dea0b582d89c981ff4544a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34630-heap-based-buffer-overflow-cwe-122--453b983d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34630%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff45447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27312-heap-based-buffer-overflow-cwe-122--d2990c18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27312%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff45441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27222-divide-by-zero-cwe-369-in-adobe-bri-14b1e4dc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27222%3A%20Divide%20By%20Zero%20(CWE-369)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=69dea0b582d89c981ff45438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27310-heap-based-buffer-overflow-cwe-122--3fb0f672</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27310%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff4543b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27311-heap-based-buffer-overflow-cwe-122--4e7b3f13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27311%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff4543e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27313-heap-based-buffer-overflow-cwe-122--c75d6669</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27313%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff45444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27289-out-of-bounds-read-cwe-125-in-adobe-94754a4d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27289%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=69de99bf82d89c981fef099d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34618-out-of-bounds-write-cwe-787-in-adob-e1917b6d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34618%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69de99bf82d89c981fef09a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34625-cross-site-scripting-dom-based-xss--f94b9c5f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34625%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de8b9f82d89c981fe4811d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34623-cross-site-scripting-dom-based-xss--e68699eb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34623%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de8b9f82d89c981fe48117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34624-cross-site-scripting-dom-based-xss--d894ffd1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34624%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de8b9f82d89c981fe4811a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-exploited-sharepoint-zero-day-an-c39d9142</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Exploited%20SharePoint%20Zero-Day%20and%20160%20Other%20Vulnerabilities&amp;severity=medium&amp;id=69de849482d89c981fdf4394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27288-cross-site-scripting-stored-xss-cwe-2673fa14</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27288%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de849e82d89c981fdf5f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0207-cwe-532-insertion-of-sensitive-infor-85e65230</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0207%3A%20CWE-532%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20PureStorage%20FlashBlade&amp;severity=high&amp;id=69de849e82d89c981fdf5f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5752-cwe-94-improper-control-of-generatio-b7af0b75</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5752%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cohere%20cohere-terrarium&amp;severity=critical&amp;id=69de849e82d89c981fdf5f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0209-cwe-783-operator-precedence-logic-er-43d7927d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0209%3A%20CWE-783%20Operator%20precedence%20logic%20error%20in%20PureStorage%20FlashArray&amp;severity=medium&amp;id=69de849e82d89c981fdf5f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5756-cwe-306-missing-authentication-for-c-3ed63c52</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5756%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Data%20Recognition%20Corporation%20Central%20Office%20Services%20-%20Content%20Hosting%20Component&amp;severity=high&amp;id=69de849e82d89c981fdf5f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5754-cwe-79-improper-neutralization-of-in-1f4c1272</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Radware%20Alteon%20vADC&amp;severity=medium&amp;id=69de849e82d89c981fdf5f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-april-2026-tue-apr-14th-ed4dfe0d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20April%202026.%2C%20(Tue%2C%20Apr%2014th)&amp;severity=medium&amp;id=69dfb6ec82d89c981f6b43d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-rowhammer-attacks-targeting-gddr6-kaspersky--5f662a36</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20Rowhammer%20attacks%20targeting%20GDDR6%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69de7db882d89c981fd91337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24907-cwe-79-improper-neutralization-of-i-2ab6df42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24907%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=69de99bf82d89c981fef09a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27303-deserialization-of-untrusted-data-c-dbcf2de2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27303%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de8b9f82d89c981fe48123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34617-cross-site-scripting-xss-cwe-79-in--9611df67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34617%3A%20Cross-site%20Scripting%20(XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=high&amp;id=69de92a582d89c981fe9f16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21331-cross-site-scripting-reflected-xss--73045699</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21331%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=69de8b9f82d89c981fe48120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27246-cross-site-scripting-dom-based-xss--d488fcd6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27246%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de849e82d89c981fdf5f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34614-cross-site-scripting-reflected-xss--c45222b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34614%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=69de99bf82d89c981fef09a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27245-cross-site-scripting-reflected-xss--e445a643</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27245%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de99bf82d89c981fef09a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34615-deserialization-of-untrusted-data-c-e3f24a99</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34615%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de8b9f82d89c981fe48126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27243-cross-site-scripting-reflected-xss--039e8e2c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27243%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de92a582d89c981fe9f167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24906-cwe-79-improper-neutralization-of-i-7323d364</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24906%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=69df733482d89c981ff25cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34628-heap-based-buffer-overflow-cwe-122--823d92b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34628%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34629-heap-based-buffer-overflow-cwe-122--3bf0ac91</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34629%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34627-heap-based-buffer-overflow-cwe-122--f3bc7c57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34627%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27258-out-of-bounds-write-cwe-787-in-adob-f0f6cfde</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27258%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=69de7a1d82d89c981fd6a728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32214-cwe-284-improper-access-control-in--487e8f7c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32214%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33829-cwe-200-exposure-of-sensitive-infor-437402c3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33829%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3b82d89c981fd6cf4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33824-cwe-415-double-free-in-microsoft-wi-87d9fb32</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33824%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=critical&amp;id=69de7a3b82d89c981fd6cf42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33827-cwe-362-concurrent-execution-using--233b55bc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33827%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33115-cwe-416-use-after-free-in-microsoft-7e929fae</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33115%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33114-cwe-822-untrusted-pointer-dereferen-23fb5e26</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33114%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33104-cwe-362-concurrent-execution-using--813cfc41</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33104%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33103-cwe-284-improper-access-control-in--7d25ac01</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33103%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.0&amp;severity=medium&amp;id=69de7a3a82d89c981fd6cf23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33101-cwe-416-use-after-free-in-microsoft-f7043ff8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33101%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33100-cwe-416-use-after-free-in-microsoft-3cedc0f4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33100%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33099-cwe-416-use-after-free-in-microsoft-b8b53f34</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33099%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32225-cwe-693-protection-mechanism-failur-c89d948c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32225%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3882d89c981fd6cef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32203-cwe-121-stack-based-buffer-overflow-e50458b0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32203%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a3682d89c981fd6bd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26171-cwe-400-uncontrolled-resource-consu-35b472ec</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26171%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32201-cwe-20-improper-input-validation-in-2c06b3ef</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32201%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32200-cwe-416-use-after-free-in-microsoft-8c849f94</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32200%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32199-cwe-416-use-after-free-in-microsoft-02ca380a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32199%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32198-cwe-416-use-after-free-in-microsoft-f8733311</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32198%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32197-cwe-416-use-after-free-in-microsoft-f71c4eb2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32197%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32196-cwe-79-improper-neutralization-of-i-59478f29</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32196%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=medium&amp;id=69de7a3482d89c981fd6bcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32190-cwe-416-use-after-free-in-microsoft-cabcfa42</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32190%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32176-cwe-89-improper-neutralization-of-s-2b96a9fb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32176%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=medium&amp;id=69de7a3282d89c981fd6bcb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32171-cwe-522-insufficiently-protected-cr-cbd219b7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32171%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Microsoft%20Azure%20Logic%20Apps&amp;severity=high&amp;id=69de7a3282d89c981fd6bcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32164-cwe-362-concurrent-execution-using--1208c733</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32164%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3282d89c981fd6bca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32163-cwe-362-concurrent-execution-using--7bc136e9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32163%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32162-cwe-349-acceptance-of-extraneous-un-4d597109</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32162%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32155-cwe-416-use-after-free-in-microsoft-170d6614</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32155%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69de7a3082d89c981fd6bc80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32153-cwe-416-use-after-free-in-microsoft-864a1c45</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32153%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32151-cwe-200-exposure-of-sensitive-infor-733dc983</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32151%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2e82d89c981fd6bc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32150-cwe-362-concurrent-execution-using--895cb39d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32150%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32149-cwe-20-improper-input-validation-in-6d462a7c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32149%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32091-cwe-362-concurrent-execution-using--ca8b3dbb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32091%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32088-cwe-362-concurrent-execution-using--98704c94</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32088%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69de7a2e82d89c981fd6bc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32086-cwe-362-concurrent-execution-using--8fa5cd49</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32086%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2b82d89c981fd6bbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32084-cwe-200-exposure-of-sensitive-infor-e73a4b1e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32084%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2b82d89c981fd6bbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32080-cwe-416-use-after-free-in-microsoft-a3c0dea3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32080%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=69de7a2b82d89c981fd6bba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32079-cwe-200-exposure-of-sensitive-infor-9d61e560</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32079%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2a82d89c981fd6bba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32078-cwe-416-use-after-free-in-microsoft-9e05253d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32078%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2a82d89c981fd6bba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32077-cwe-822-untrusted-pointer-dereferen-4a7c3005</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32077%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2a82d89c981fd6bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32076-cwe-125-out-of-bounds-read-in-micro-e50ab91b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32076%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a2782d89c981fd6ba71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32074-cwe-415-double-free-in-microsoft-wi-6993a728</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32074%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2782d89c981fd6ba6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32072-cwe-287-improper-authentication-in--cb921f80</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32072%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2782d89c981fd6ba65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32070-cwe-416-use-after-free-in-microsoft-c2a86ecf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32070%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32069-cwe-415-double-free-in-microsoft-wi-052e17b7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32069%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2782d89c981fd6ba5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32068-cwe-362-concurrent-execution-using--8fa9958c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32068%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27930-cwe-125-out-of-bounds-read-in-micro-a028a6ba</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27930%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2482d89c981fd6ba0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27928-cwe-20-improper-input-validation-in-3af173ba</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27928%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=69de7a2482d89c981fd6ba05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27925-cwe-416-use-after-free-in-microsoft-b2af4507</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27925%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2482d89c981fd6b9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27923-cwe-416-use-after-free-in-microsoft-a1d83d45</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27923%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27922-cwe-416-use-after-free-in-microsoft-9e17349b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27922%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27920-cwe-822-untrusted-pointer-dereferen-41e8c3a2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27920%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27916-cwe-416-use-after-free-in-microsoft-8199ddd9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27916%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27914-cwe-284-improper-access-control-in--0c3c451b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27914%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27913-cwe-20-improper-input-validation-in-4fef816e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27913%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a2182d89c981fd6a7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27912-cwe-285-improper-authorization-in-m-4d0501e2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27912%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a2182d89c981fd6a7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27911-cwe-362-concurrent-execution-using--5f29327a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27911%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27910-cwe-280-improper-handling-of-insuff-924af22b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27910%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27909-cwe-416-use-after-free-in-microsoft-5fd4b2ca</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27909%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26184-cwe-126-buffer-over-read-in-microso-ad60a26c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26184%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1d82d89c981fd6a725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26182-cwe-416-use-after-free-in-microsoft-dc67948f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26182%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26178-cwe-681-incorrect-conversion-betwee-60374287</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26178%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26177-cwe-416-use-after-free-in-microsoft-4466664b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26177%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26176-cwe-122-heap-based-buffer-overflow--3555ecfe</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26176%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26173-cwe-362-concurrent-execution-using--bc17a212</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26173%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26172-cwe-362-concurrent-execution-using--d4bfead1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26172%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26170-cwe-20-improper-input-validation-in-bd46df79</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26170%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26169-cwe-126-buffer-over-read-in-microso-d0ca5e4d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26169%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1882d89c981fd6a689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26168-cwe-362-concurrent-execution-using--7b02765b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26168%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26163-cwe-415-double-free-in-microsoft-wi-830867f1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26163%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26159-cwe-306-missing-authentication-for--ad6e8baf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26159%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26156-cwe-122-heap-based-buffer-overflow--6a57a6f9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26156%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26153-cwe-125-out-of-bounds-read-in-micro-36bba8cc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26153%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1682d89c981fd6a630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26152-cwe-922-insecure-storage-of-sensiti-68f2db89</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26152%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26143-cwe-20-improper-input-validation-in-08916d7b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26143%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20PowerShell%207.4&amp;severity=high&amp;id=69de7a1682d89c981fd6a624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23666-cwe-755-improper-handling-of-except-c8599af8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23666%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Microsoft%20Microsoft%20.NET%20Framework%203.5&amp;severity=high&amp;id=69de7a1482d89c981fd6a5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23657-cwe-416-use-after-free-in-microsoft-172fe6dc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23657%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a1482d89c981fd6a5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20806-cwe-843-access-of-resource-using-in-2db342f6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20806%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20928-cwe-212-improper-removal-of-sensiti-d55f0b35</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20928%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32212-cwe-59-improper-link-resolution-bef-a8315ee6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32212%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33826-cwe-20-improper-input-validation-in-ed85b68e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33826%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33825-cwe-1220-insufficient-granularity-o-73be6db2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33825%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Microsoft%20Microsoft%20Defender%20Antimalware%20Platform&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33822-cwe-125-out-of-bounds-read-in-micro-97400ae0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33822%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=69de7a3a82d89c981fd6cf35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33120-cwe-822-untrusted-pointer-dereferen-338cc6ab</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33120%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20(GDR)&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33116-cwe-835-loop-with-unreachable-exit--6d2e9668</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33116%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33098-cwe-416-use-after-free-in-microsoft-14fa30d5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33098%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3882d89c981fd6ceff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33096-cwe-125-out-of-bounds-read-in-micro-f99fbaaa</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33096%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a3882d89c981fd6cefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33095-cwe-416-use-after-free-in-microsoft-72848262</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33095%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3882d89c981fd6cef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32226-cwe-362-concurrent-execution-using--694f061d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32226%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Microsoft%20.NET%20Framework%203.5%20AND%204.7.2&amp;severity=medium&amp;id=69de7a3882d89c981fd6cef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32224-cwe-416-use-after-free-in-microsoft-b1f0a247</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32224%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2026H1&amp;severity=high&amp;id=69de7a3882d89c981fd6cef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32223-cwe-122-heap-based-buffer-overflow--3c007cd2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32223%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69de7a3882d89c981fd6ceed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32222-cwe-822-untrusted-pointer-dereferen-e2689638</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32222%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3882d89c981fd6ceea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32221-cwe-122-heap-based-buffer-overflow--473ffa00</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32221%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3882d89c981fd6cee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32220-cwe-284-improper-access-control-in--a2aa9aa4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32220%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69de7a3882d89c981fd6cee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32219-cwe-415-double-free-in-microsoft-wi-31dc6599</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32219%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3682d89c981fd6bd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32218-cwe-532-insertion-of-sensitive-info-269049f7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32218%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32217-cwe-532-insertion-of-sensitive-info-8c9fae6c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32217%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32216-cwe-476-null-pointer-dereference-in-37c0ed57</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32216%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2026H1&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32215-cwe-532-insertion-of-sensitive-info-fd4d1ad6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32215%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32202-cwe-693-protection-mechanism-failur-2f0cf818</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32202%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32195-cwe-121-stack-based-buffer-overflow-9606beb6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32195%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2026H1&amp;severity=high&amp;id=69de7a3482d89c981fd6bcd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32192-cwe-502-deserialization-of-untruste-07ba7463</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32192%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=69de7a3482d89c981fd6bcd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32189-cwe-416-use-after-free-in-microsoft-b211091f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32189%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32188-cwe-125-out-of-bounds-read-in-micro-9b236598</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32188%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32184-cwe-502-deserialization-of-untruste-a3c0ec1f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32184%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20HPC%20Pack%202019&amp;severity=high&amp;id=69de7a3282d89c981fd6bcbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32183-cwe-77-improper-neutralization-of-s-4b6f9ccb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32183%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3282d89c981fd6bcba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32181-cwe-269-improper-privilege-manageme-16c18e6f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32181%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a3282d89c981fd6bcb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32178-cwe-138-improper-neutralization-of--1098599a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32178%3A%20CWE-138%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a3282d89c981fd6bcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32168-cwe-20-improper-input-validation-in-d5b2309c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32168%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=69de7a3282d89c981fd6bcab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32167-cwe-89-improper-neutralization-of-s-4dfb3470</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32167%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=medium&amp;id=69de7a3282d89c981fd6bca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32165-cwe-416-use-after-free-in-microsoft-c826ca80</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32165%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3282d89c981fd6bca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0390-cwe-807-reliance-on-untrusted-inputs-645ada93</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0390%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32160-cwe-362-concurrent-execution-using--b0e2a872</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32160%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32159-cwe-362-concurrent-execution-using--f1bafff5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32159%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32158-cwe-362-concurrent-execution-using--9e8e2131</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32158%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32157-cwe-416-use-after-free-in-microsoft-c1ea29fc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32157%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=69de7a3082d89c981fd6bc86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32156-cwe-416-use-after-free-in-microsoft-1ff5b5c0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32156%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3082d89c981fd6bc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32154-cwe-416-use-after-free-in-microsoft-69fdc6d1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32154%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3082d89c981fd6bc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32152-cwe-416-use-after-free-in-microsoft-5e3440ee</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32152%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32093-cwe-362-concurrent-execution-using--ec561814</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32093%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32090-cwe-362-concurrent-execution-using--cdda107b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32090%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32089-cwe-416-use-after-free-in-microsoft-257d5db1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32089%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32087-cwe-122-heap-based-buffer-overflow--46a63183</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32087%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32085-cwe-200-exposure-of-sensitive-infor-41cb0b72</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32085%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2b82d89c981fd6bbb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32083-cwe-362-concurrent-execution-using--66cd44bc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32083%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2b82d89c981fd6bbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32082-cwe-362-concurrent-execution-using--ed659fd9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32082%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2b82d89c981fd6bbac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32081-cwe-200-exposure-of-sensitive-infor-eaa6be22</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32081%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2b82d89c981fd6bba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32075-cwe-416-use-after-free-in-microsoft-f193305b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32075%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32073-cwe-416-use-after-free-in-microsoft-3211bff7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32073%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32071-cwe-476-null-pointer-dereference-in-f3c1af73</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32071%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27931-cwe-125-out-of-bounds-read-in-micro-9cddb35d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27931%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a2782d89c981fd6ba56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27929-cwe-367-time-of-check-time-of-use-t-7832f9c5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27929%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6ba08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27927-cwe-362-concurrent-execution-using--2bc68001</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27927%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2482d89c981fd6ba02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27926-cwe-362-concurrent-execution-using--e10b68a2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27926%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2482d89c981fd6b9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27924-cwe-416-use-after-free-in-microsoft-377a37ef</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27924%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27921-cwe-362-concurrent-execution-using--62fdd6b4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27921%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27919-cwe-822-untrusted-pointer-dereferen-87fe2437</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27919%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27918-cwe-362-concurrent-execution-using--0668203c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27918%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27917-cwe-416-use-after-free-in-microsoft-7740877c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27917%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27915-cwe-416-use-after-free-in-microsoft-71e31363</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27915%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27908-cwe-416-use-after-free-in-microsoft-9fbfd6e5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27908%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27907-cwe-191-integer-underflow-wrap-or-w-3c6fcbdb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27907%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1d82d89c981fd6a72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27906-cwe-20-improper-input-validation-in-15b1add6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27906%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a1d82d89c981fd6a72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26183-cwe-284-improper-access-control-in--e52fa728</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26183%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a1d82d89c981fd6a722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26181-cwe-416-use-after-free-in-microsoft-0ec1d3f4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26181%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1d82d89c981fd6a71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26180-cwe-122-heap-based-buffer-overflow--9ff59786</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26180%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26179-cwe-415-double-free-in-microsoft-wi-eef77c20</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26179%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26175-cwe-908-use-of-uninitialized-resour-152461da</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26175%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1b82d89c981fd6a6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26174-cwe-362-concurrent-execution-using--28417f6f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26174%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26167-cwe-362-concurrent-execution-using--55e636ec</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26167%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26166-cwe-415-double-free-in-microsoft-wi-9232decb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26166%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1882d89c981fd6a680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26165-cwe-416-use-after-free-in-microsoft-abfbc4b8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26165%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1882d89c981fd6a67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26162-cwe-843-access-of-resource-using-in-db050af1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26162%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26161-cwe-822-untrusted-pointer-dereferen-41499af6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26161%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1882d89c981fd6a674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26160-cwe-306-missing-authentication-for--0ab417a0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26160%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26155-cwe-126-buffer-over-read-in-microso-490c3d1f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26155%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1682d89c981fd6a636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26154-cwe-20-improper-input-validation-in-68836085</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26154%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a1682d89c981fd6a633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26151-cwe-357-insufficient-ui-warning-of--baf70412</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26151%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26149-cwe-150-improper-neutralization-of--adf80a1e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26149%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Microsoft%20Microsoft%20Power%20Apps%20Desktop%20Client&amp;severity=critical&amp;id=69de7a1682d89c981fd6a627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23670-cwe-822-untrusted-pointer-dereferen-0022d68e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23670%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20945-cwe-79-improper-neutralization-of-i-ac52a74d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20945%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25184-cwe-362-concurrent-execution-using--2773ff78</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25184%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1682d89c981fd6a621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23653-cwe-77-improper-neutralization-of-s-a7104260</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23653%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20930-cwe-362-concurrent-execution-using--d0dc4957</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20930%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1482d89c981fd6a5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22692-cwe-693-protection-mechanism-failur-9f968e3e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22692%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20octobercms%20october&amp;severity=medium&amp;id=69de731682d89c981fcd5a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-55-vulnerabilities-across-11-product-19dbeb63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%2055%20Vulnerabilities%20Across%2011%20Products&amp;severity=critical&amp;id=69de730182d89c981fcd5435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27284-out-of-bounds-read-cwe-125-in-adobe-7d74c03d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27284%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27285-heap-based-buffer-overflow-cwe-122--d9d30173</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27285%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=69de731682d89c981fcd5a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27286-heap-based-buffer-overflow-cwe-122--4630805d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27286%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=69de731682d89c981fcd5a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27283-use-after-free-cwe-416-in-adobe-ind-6947ba14</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27283%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27238-heap-based-buffer-overflow-cwe-122--f7fd79e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27238%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27291-out-of-bounds-write-cwe-787-in-adob-27b71255</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27291%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34622-improperly-controlled-modification--0326b95e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34622%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20(CWE-1321)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69de6c0582d89c981fc4d748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34626-improperly-controlled-modification--bd4cf4c2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34626%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20(CWE-1321)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69de6c0582d89c981fc4d74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61624-escalation-of-privilege-in-fortinet-171166f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61624%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=69de650582d89c981fbed4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68649-escalation-of-privilege-in-fortinet-a0698cd6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68649%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiManager%20Cloud&amp;severity=medium&amp;id=69de650582d89c981fbed4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21741-execute-unauthorized-code-or-comman-0f7a52d6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21741%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiNAC-F&amp;severity=low&amp;id=69de650582d89c981fbed4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39813-escalation-of-privilege-in-fortinet-082bcf5d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39813%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSandbox&amp;severity=critical&amp;id=69de650a82d89c981fbf0910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61848-execute-unauthorized-code-or-comman-458240a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61848%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=69de650582d89c981fbed4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22828-escalation-of-privilege-in-fortinet-0564d74b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22828%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiAnalyzer%20Cloud&amp;severity=high&amp;id=69de650782d89c981fbf0855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39815-execute-unauthorized-code-or-comman-d6a1fcb6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39815%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiDDoS-F&amp;severity=high&amp;id=69de650a82d89c981fbf0916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22573-information-disclosure-in-fortinet--07902490</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22573%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69de650782d89c981fbf084c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61886-execute-unauthorized-code-or-comman-5a3555e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61886%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox%20PaaS&amp;severity=medium&amp;id=69de650582d89c981fbed4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39810-information-disclosure-in-fortinet--75ea6d30</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39810%3A%20Information%20disclosure%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=69de650782d89c981fbf0864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39811-denial-of-service-in-fortinet-forti-2563cace</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39811%3A%20Denial%20of%20service%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69de650a82d89c981fbf090a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23104-information-disclosure-in-fortinet--1b48f58e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23104%3A%20Information%20disclosure%20in%20Fortinet%20FortiVoice&amp;severity=medium&amp;id=69de650582d89c981fbed4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39812-execute-unauthorized-code-or-comman-5b024998</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39812%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69de650a82d89c981fbf090d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23708-escalation-of-privilege-in-fortinet-4da37711</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23708%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf0858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39814-execute-unauthorized-code-or-comman-c67b5e5c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39814%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69de650a82d89c981fbf0913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25691-execute-unauthorized-code-or-comman-ba5ba8c1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25691%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf085b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59809-information-disclosure-in-fortinet--f1b923ab</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59809%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69de650582d89c981fbed4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22155-information-disclosure-in-fortinet--32ef1497</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22155%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69de650782d89c981fbf0849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21742-information-disclosure-in-fortinet--5a5a88a8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21742%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650582d89c981fbed4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/108-chrome-extensions-linked-to-data-exfiltration--8c012474</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=108%20Chrome%20Extensions%20Linked%20to%20Data%20Exfiltration%20and%20Session%20Theft%20via%20Shared%20C2%20Infrastructure&amp;severity=medium&amp;id=69de616b82d89c981fbc694d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22574-information-disclosure-in-fortinet--7c8cd4e8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22574%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf084f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22154-escalation-of-privilege-in-fortinet-67e3b19b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22154%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650582d89c981fbed4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53847-execute-unauthorized-code-or-comman-5f90cc02</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53847%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=69de650582d89c981fbed4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22576-information-disclosure-in-fortinet--eccd0793</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22576%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf0852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27316-information-disclosure-in-fortinet--23983c6d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27316%3A%20Information%20disclosure%20in%20Fortinet%20FortiSandbox&amp;severity=low&amp;id=69de650782d89c981fbf085e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39808-execute-unauthorized-code-or-comman-af629bfe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39808%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=critical&amp;id=69de650782d89c981fbf0861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2401-cwe-532-insertion-of-sensitive-infor-d453bf47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2401%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=low&amp;id=69de5dec82d89c981fb97446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2400-cwe-93-improper-neutralization-of-cr-d42f5774</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2400%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5dec82d89c981fb97443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2403-cwe-1284-improper-validation-of-spec-9964a9ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2403%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5def82d89c981fb974be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2405-cwe-400-uncontrolled-resource-consum-f72b6df0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2405%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5def82d89c981fb974c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2402-cwe-307-improper-restriction-of-exce-64f33449</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2402%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5dec82d89c981fb97449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2404-cwe-116-improper-encoding-or-escapin-b02daa7f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2404%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5def82d89c981fb974c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5713-cwe-121-stack-based-buffer-overflow--f68faa6f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5713%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69de5df182d89c981fb975c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2399-cwe-22-improper-limitation-of-a-path-c929fbb7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2399%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5dec82d89c981fb97440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39809-execute-unauthorized-code-or-comman-ed3cd125</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39809%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=69de5df182d89c981fb975ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4832-cwe-798-use-of-hard-coded-credential-ebfe7271</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4832%3A%20CWE-798%20Use%20of%20Hard-Coded%20Credentials%20in%20Schneider%20Electric%20Easergy%20MiCOM%20P14x&amp;severity=medium&amp;id=69de5df182d89c981fb975bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37980-improper-neutralization-of-input-du-20974fc9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37980%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69de56e582d89c981fb1904d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4914-cwe-79-improper-neutralization-of-in-71edc76f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4914%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Ivanti%20Neurons%20for%20ITSM%20(On-Premise)&amp;severity=medium&amp;id=69de4ff282d89c981fa84ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4913-cwe-424-improper-protection-of-alter-48b0cd1c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4913%3A%20CWE-424%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20Ivanti%20Neurons%20for%20ITSM%20(On-Premise)&amp;severity=medium&amp;id=69de4ff282d89c981fa84c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/59-victims-zero-authentication-a-clickfix-campaign-64ad7f8a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=59%20Victims%2C%20Zero%20Authentication%3A%20A%20ClickFix%20Campaign%20Force-Installs%20a%20Chrome%20Extension%20Banking%20Stealer%20and%20Leaves%20the%20Entire%20C2%20Wide%20Open&amp;severity=medium&amp;id=69de4c5382d89c981fa44b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4344-cwe-79-cross-site-scripting-xss-stor-9662e895</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4344%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69de4ff282d89c981fa84c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4345-cwe-79-cross-site-scripting-xss-stor-de128268</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4345%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69de4ff282d89c981fa84c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4369-cwe-79-cross-site-scripting-xss-stor-c9a1cc3b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4369%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69de4ff282d89c981fa84c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8095-cwe-257-in-progress-software-corpora-f20f50ae</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8095%3A%20CWE-257%20in%20Progress%20Software%20Corporation%20OpenEdge&amp;severity=critical&amp;id=69de455082d89c981f9c8aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7389-cwe-552-in-progress-software-corpora-c6476335</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7389%3A%20CWE-552%20in%20Progress%20Software%20Corporation%20OpenEdge&amp;severity=high&amp;id=69de455082d89c981f9c8a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mythos-ready-security-csa-urges-cisos-to-prepare-f-bf8a68c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Mythos-Ready%E2%80%99%20Security%3A%20CSA%20Urges%20CISOs%20to%20Prepare%20for%20Accelerated%20AI%20Threats&amp;severity=high&amp;id=69de3ac082d89c981f8db41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europes-largest-gym-chain-says-data-breach-impacts-d650bf86</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europe%E2%80%99s%20Largest%20Gym%20Chain%20Says%20Data%20Breach%20Impacts%201%20Million%20Members&amp;severity=medium&amp;id=69de373c82d89c981f5ace10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2450-cwe-520-net-misconfiguration-use-of--335f73f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2450%3A%20CWE-520%20.NET%20misconfiguration%3A%20use%20of%20impersonation%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=high&amp;id=69de374582d89c981f5b1485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2449-cwe-88-improper-neutralization-of-ar-cd196faa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2449%3A%20CWE-88%20Improper%20neutralization%20of%20argument%20delimiters%20in%20a%20command%20(&apos;argument%20injection&apos;)%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=critical&amp;id=69de303282d89c981f2e25f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24069-cwe-863-incorrect-authorization-in--a08b3733</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24069%3A%20CWE-863%20Incorrect%20Authorization%20in%20Kiuwan%20SAST&amp;severity=medium&amp;id=69de292b82d89c981f2a390c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-abap-vulnerability-a01b2740</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20ABAP%20Vulnerability&amp;severity=critical&amp;id=69de25a882d89c981f28f984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2332-cwe-444-inconsistent-interpretation--174fc831</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2332%3A%20CWE-444%20Inconsistent%20interpretation%20of%20HTTP%20requests%20(&apos;HTTP%20Request%2FResponse%20smuggling&apos;)%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=69de25ad82d89c981f28fd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/triad-nexus-evades-sanctions-to-fuel-cybercrime-14f3246a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Triad%20Nexus%20Evades%20Sanctions%20to%20Fuel%20Cybercrime&amp;severity=medium&amp;id=69de1e9f82d89c981f23508f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-adds-rust-dns-parser-to-pixel-phones-for-be-4f83f373</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Adds%20Rust%20DNS%20Parser%20to%20Pixel%20Phones%20for%20Better%20Security&amp;severity=low&amp;id=69de179782d89c981f1f8f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nightclub-giant-rci-hospitality-reports-data-breac-bed7c779</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nightclub%20Giant%20RCI%20Hospitality%20Reports%20Data%20Breach&amp;severity=medium&amp;id=69de0d0c82d89c981f1a3e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-windows-adobe-ac-ff246528</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Windows%2C%20Adobe%20Acrobat%20Vulnerabilities&amp;severity=low&amp;id=69de028082d89c981f1493f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pretexting-based-targeted-intrusion-analysis-of-fa-f57a71c9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pretexting-Based%20Targeted%20Intrusion%3A%20Analysis%20of%20Facebook%20Reconnaissance%20and%20Software%20Tampering%20Attacks&amp;severity=medium&amp;id=69de099282d89c981f185723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/q1-2026-malware-statistics-report-for-linux-ssh-se-45d5088d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Q1%202026%20Malware%20Statistics%20Report%20for%20Linux%20SSH%20Servers&amp;severity=medium&amp;id=69de099282d89c981f18573a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/q1-2026-malware-statistics-report-for-windows-data-beb6a9fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Q1%202026%20Malware%20Statistics%20Report%20for%20Windows%20Database%20Servers&amp;severity=medium&amp;id=69de099282d89c981f18573e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33892-cwe-305-authentication-bypass-by-pr-d1d1565e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33892%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Siemens%20Industrial%20Edge%20Management%20Pro%20V1&amp;severity=high&amp;id=69de028682d89c981f14951c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27668-cwe-266-incorrect-privilege-assignm-3966ad74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27668%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Siemens%20RUGGEDCOM%20CROSSBOW%20Secure%20Access%20Manager%20Primary%20(SAM-P)&amp;severity=high&amp;id=69de028682d89c981f149516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25654-cwe-639-authorization-bypass-throug-94590bb2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25654%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=69de028682d89c981f149513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24032-cwe-347-improper-verification-of-cr-59b40820</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24032%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=69de028682d89c981f149510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40745-cwe-295-improper-certificate-valida-40b15c00</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40745%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20Siemens%20Software%20Center&amp;severity=low&amp;id=69de028682d89c981f14950d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31923-cwe-319-cleartext-transmission-of-s-568d8687</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31923%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=high&amp;id=69de028682d89c981f149519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33929-cwe-22-improper-limitation-of-a-pat-2d3fd231</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33929%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20PDFBox%20Examples&amp;severity=medium&amp;id=69ddf7fa82d89c981f0815e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31924-cwe-319-cleartext-transmission-of-s-194e8ae1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31924%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=medium&amp;id=69ddf7fa82d89c981f0815e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31908-cwe-75-failure-to-sanitize-special--741cc648</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31908%3A%20CWE-75%20Failure%20to%20Sanitize%20Special%20Elements%20into%20a%20Different%20Plane%20(Special%20Element%20Injection)%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=critical&amp;id=69ddf7fa82d89c981f0815e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4109-cwe-862-missing-authorization-in-arr-dc2bacc4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4109%3A%20CWE-862%20Missing%20Authorization%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Calendar%2C%20Event%20Registration%2C%20Tickets%20%26%20Booking%20(AI%20Powered)&amp;severity=medium&amp;id=69ddf7fa82d89c981f0815eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2582-cwe-94-improper-control-of-generatio-55d074f6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2582%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vendidero%20Germanized%20for%20WooCommerce&amp;severity=medium&amp;id=69dde66a82d89c981ffc957b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3017-cwe-502-deserialization-of-untrusted-13c099d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3017%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20shapedplugin%20Smart%20Post%20Show%20%E2%80%93%20Post%20Grid%2C%20Post%20Carousel%20%26%20Slider%2C%20and%20List%20Category%20Posts&amp;severity=high&amp;id=69ddd4cb82d89c981fef0e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4059-cwe-79-improper-neutralization-of-in-714c11b5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4059%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=medium&amp;id=69ddbc3182d89c981fc24dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4479-cwe-79-improper-neutralization-of-in-f0bfaad2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4479%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcodefactory%20WholeSale%20Products%20Dynamic%20Pricing%20Management%20WooCommerce&amp;severity=medium&amp;id=69ddbc3182d89c981fc24de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1607-cwe-79-improper-neutralization-of-in-0a460d9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1607%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surbma%20Surbma%20%7C%20Booking.com%20Shortcode&amp;severity=medium&amp;id=69ddbc3182d89c981fc24dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40313-cwe-829-inclusion-of-functionality--2d33a73b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40313%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69ddbc3182d89c981fc24dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40289-cwe-306-missing-authentication-for--874e515b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40289%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69ddbc3182d89c981fc24dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40288-cwe-78-improper-neutralization-of-s-06bb92e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40288%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69ddbc3182d89c981fc24dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40287-cwe-94-improper-control-of-generati-5261cfa0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40287%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69ddbc3182d89c981fc24dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40315-cwe-89-improper-neutralization-of-s-999a7473</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40315%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69ddbc3182d89c981fc24dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4388-cwe-79-improper-neutralization-of-in-167b94fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=69ddaa9d82d89c981fae6a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6227-cwe-22-improper-limitation-of-a-path-032a5e88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6227%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wp_media%20BackWPup%20%E2%80%93%20WordPress%20Backup%20%26%20Restore%20Plugin&amp;severity=high&amp;id=69ddaa9d82d89c981fae6a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-14th-2026-httpsisc-7c596c94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%2014th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9890%2C%20(Tue%2C%20Apr%2014th)&amp;severity=medium&amp;id=69dda00f82d89c981fa6090a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6264-cwe-306-missing-authentication-for-c-26a424cb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6264%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Talend%20Talend%20JobServer&amp;severity=critical&amp;id=69ddaa9d82d89c981fae6a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39426-cwe-79-improper-neutralization-of-i-9106c343</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39426%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd9c8b82d89c981fa1192c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4352-cwe-89-improper-neutralization-of-sp-cdc75f12</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4352%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69dd9c8b82d89c981fa11930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4365-cwe-862-missing-authorization-in-thi-8046e47d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4365%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=critical&amp;id=69dd9c8b82d89c981fa11934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39425-cwe-80-improper-neutralization-of-s-7656d9e4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39425%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd9c8b82d89c981fa11928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39419-cwe-74-improper-neutralization-of-s-734f4c72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39419%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=low&amp;id=69dd9c8b82d89c981fa11923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39424-cwe-1236-improper-neutralization-of-e6ee8a15</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39424%3A%20CWE-1236%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958b82d89c981f9c58a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39423-cwe-79-improper-neutralization-of-i-4b9705b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39423%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c582f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39422-cwe-79-improper-neutralization-of-i-0c702d0b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39422%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c582a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39421-cwe-693-protection-mechanism-failur-b21ad8fb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39421%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c5825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39420-cwe-693-protection-mechanism-failur-44d68598</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39420%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c5820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34264-cwe-204-observable-response-discrep-8e45814a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34264%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20SAP_SE%20SAP%20Human%20Capital%20Management%20for%20SAP%20S%2F4HANA&amp;severity=medium&amp;id=69dd958882d89c981f9c5817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34262-cwe-522-insufficiently-protected-cr-cde26fc9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34262%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SAP_SE%20SAP%20HANA%20Cockpit%20and%20HANA%20Database%20Explorer&amp;severity=medium&amp;id=69dd958882d89c981f9c5813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34261-cwe-862-missing-authorization-in-sa-c726a93c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34261%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Analytics%20and%20SAP%20Content%20Management&amp;severity=medium&amp;id=69dd958882d89c981f9c580f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39418-cwe-918-server-side-request-forgery-badcbb3e</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39418%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c581b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34257-cwe-601-url-redirection-to-untruste-3a3250f2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34257%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP&amp;severity=medium&amp;id=69dd958882d89c981f9c580b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34256-cwe-862-missing-authorization-in-sa-6bf07d71</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34256%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20ERP%20and%20SAP%20S%2F4%20HANA%20(Private%20Cloud%20and%20On-Premise)&amp;severity=high&amp;id=69dd958882d89c981f9c5807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27683-cwe-79-improper-neutralization-of-i-03fa2e5c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27683%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=medium&amp;id=69dd877882d89c981f920dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27681-cwe-89-improper-neutralization-of-s-a7704991</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27681%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20Business%20Planning%20and%20Consolidation%20and%20SAP%20Business%20Warehouse&amp;severity=critical&amp;id=69dd877882d89c981f920dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27679-cwe-862-missing-authorization-in-sa-90db80ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27679%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20Frontend%20OData%20Service%20(Manage%20Reference%20Structures)&amp;severity=medium&amp;id=69dd877482d89c981f91f53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27678-cwe-862-missing-authorization-in-sa-b49825de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27678%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20Backend%20OData%20Service%20(Manage%20Reference%20Structures)&amp;severity=medium&amp;id=69dd877482d89c981f91f538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27677-cwe-862-missing-authorization-in-sa-5a7f4542</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27677%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20OData%20Service%20(Manage%20Reference%20Equipment)&amp;severity=medium&amp;id=69dd877482d89c981f91f534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27676-cwe-862-missing-authorization-in-sa-f0093fbc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27676%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20OData%20Service%20(Manage%20Technical%20Object%20Structures)&amp;severity=medium&amp;id=69dd877482d89c981f91f530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27675-cwe-94-improper-control-of-generati-d79b5e7f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27675%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Landscape%20Transformation&amp;severity=low&amp;id=69dd877482d89c981f91f52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27674-cwe-94-improper-control-of-generati-017daca5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27674%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java%20(Web%20Dynpro%20Java)&amp;severity=medium&amp;id=69dd877482d89c981f91f528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27673-cwe-862-missing-authorization-in-sa-0d3d76b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27673%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20and%20On-Premise)&amp;severity=medium&amp;id=69dd877482d89c981f91f524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27672-cwe-862-missing-authorization-in-sa-cbb9e4e4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27672%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20Material%20Master%20Application&amp;severity=medium&amp;id=69dd877482d89c981f91f520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24318-cwe-539-use-of-persistent-cookies-c-b5e0c8eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24318%3A%20CWE-539%3A%20Use%20of%20Persistent%20Cookies%20Containing%20Sensitive%20Information%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=medium&amp;id=69dd877482d89c981f91f51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0512-cwe-79-improper-neutralization-of-in-f12252f5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0512%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(SICF%20Handler%20in%20SRM%20Catalog)&amp;severity=medium&amp;id=69dd877482d89c981f91f518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39417-cwe-78-improper-neutralization-of-s-4644a8c0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39417%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd877882d89c981f920dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-15-4bca6267</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-15&amp;severity=medium&amp;id=69df507382d89c981fb85c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-14-de7e96bd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-14&amp;severity=medium&amp;id=69ded8ea82d89c981f22a762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70023-na-8e2b761a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70023%3A%20n%2Fa&amp;severity=critical&amp;id=69de7a1482d89c981fd6a5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38533-na-76357efe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38533%3A%20n%2Fa&amp;severity=medium&amp;id=69de5def82d89c981fb974df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38532-na-9e2b1a7e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38532%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38530-na-2a555f71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38530%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38529-na-707c3506</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38529%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38528-na-96f7457a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38528%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38527-na-61b4f49b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38527%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38526-na-df6c8898</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38526%3A%20n%2Fa&amp;severity=critical&amp;id=69de5def82d89c981fb974c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65136-na-7288dd01</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65136%3A%20n%2Fa&amp;severity=medium&amp;id=69de5dec82d89c981fb9743d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65135-na-31ed1bec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65135%3A%20n%2Fa&amp;severity=critical&amp;id=69de5dec82d89c981fb9743a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65134-na-7cf4c1e4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65134%3A%20n%2Fa&amp;severity=null&amp;id=69de5dec82d89c981fb97437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65133-na-972d16f1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65133%3A%20n%2Fa&amp;severity=critical&amp;id=69de5dec82d89c981fb97434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65132-na-f679a329</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65132%3A%20n%2Fa&amp;severity=medium&amp;id=69de5dec82d89c981fb97431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63939-na-64059743</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63939%3A%20n%2Fa&amp;severity=critical&amp;id=69de5dec82d89c981fb9742e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69993-na-c06fcbbf</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69993%3A%20n%2Fa&amp;severity=medium&amp;id=69de56e582d89c981fb19049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69893-na-68897447</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69893%3A%20n%2Fa&amp;severity=medium&amp;id=69de56e582d89c981fb19045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37602-na-75e0d8cd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37602%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37601-na-c6edace0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37601%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37600-na-9dcd1e03</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37600%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37598-na-a4dc131b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37598%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37597-na-672bf1be</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37597%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37596-na-9b822437</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37596%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37595-na-e4e245bd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37595%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37594-na-f4237f0c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37594%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37593-na-b3454f76</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37593%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37592-na-24e4e97b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37592%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37591-na-d31493d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37591%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37590-na-442af028</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37590%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37589-na-fc0502ef</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37589%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30480-na-bf48b2a2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30480%3A%20n%2Fa&amp;severity=medium&amp;id=69de4fef82d89c981fa84b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61260-na-0294716d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61260%3A%20n%2Fa&amp;severity=critical&amp;id=69de4fef82d89c981fa84b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31049-na-bfd86452</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31049%3A%20n%2Fa&amp;severity=critical&amp;id=69de455082d89c981f9c8aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-14-62da04f7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-14&amp;severity=low&amp;id=69dda38b82d89c981fa8a874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34069-cwe-617-reachable-assertion-in-nimi-b4043ed2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34069%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20nimiq%20core-rs-albatross&amp;severity=medium&amp;id=69dd877882d89c981f920dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33948-cwe-170-improper-null-termination-i-a19631d0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33948%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20jqlang%20jq&amp;severity=low&amp;id=69dd83f182d89c981f8ff256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40164-cwe-328-use-of-weak-hash-in-jqlang--2e4df7f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40164%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20jqlang%20jq&amp;severity=high&amp;id=69dd83f182d89c981f8ff25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5086-cwe-208-observable-timing-discrepanc-a3e1c12b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5086%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20NERDVANA%20Crypt%3A%3ASecretBuffer&amp;severity=high&amp;id=69dd75df82d89c981f793936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6203-cwe-601-url-redirection-to-untrusted-33a1f48a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6203%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69dd725c82d89c981f75a06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39979-cwe-125-out-of-bounds-read-in-jqlan-ef659246</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39979%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20jqlang%20jq&amp;severity=medium&amp;id=69dd725c82d89c981f75a06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39956-cwe-125-out-of-bounds-read-in-jqlan-b9793416</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39956%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20jqlang%20jq&amp;severity=medium&amp;id=69dd6ed782d89c981f72b22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4786-cwe-77-in-python-software-foundation-0859811e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4786%3A%20CWE-77%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69dd67d182d89c981f6a0138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33947-cwe-674-uncontrolled-recursion-in-j-e92b8dcc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33947%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20jqlang%20jq&amp;severity=medium&amp;id=69dd67d182d89c981f6a0134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22563-cwe-20-improper-input-validation-in-4175b900</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22563%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=critical&amp;id=69dd644b82d89c981f67c511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22562-cwe-22-path-traversal-in-ubiquiti-i-464fb9b6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22562%3A%20CWE-22%20Path%20Traversal%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=critical&amp;id=69dd644b82d89c981f67c50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22566-cwe-284-improper-access-control-gen-119ad1e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22566%3A%20CWE-284%20Improper%20Access%20Control%20-%20Generic%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=high&amp;id=69dd644b82d89c981f67c51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22565-cwe-20-improper-input-validation-in-bf7c6da9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22565%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=high&amp;id=69dd644b82d89c981f67c517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22564-cwe-284-improper-access-control-gen-9d486d7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22564%3A%20CWE-284%20Improper%20Access%20Control%20-%20Generic%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=critical&amp;id=69dd644b82d89c981f67c514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6224-sandbox-issue-in-nocobase-plugin-wor-972a9f2b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6224%3A%20Sandbox%20Issue%20in%20nocobase%20plugin-workflow-javascript&amp;severity=medium&amp;id=69dd60c882d89c981f657d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6220-server-side-request-forgery-in-humme-1003d9ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6220%3A%20Server-Side%20Request%20Forgery%20in%20HummerRisk&amp;severity=medium&amp;id=69dd60c882d89c981f657cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6219-command-injection-in-aandrew-me-ytdo-7fe71fa6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6219%3A%20Command%20Injection%20in%20aandrew-me%20ytDownloader&amp;severity=medium&amp;id=69dd59c182d89c981f5d4d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6218-cross-site-scripting-in-aandrew-me-y-047a4078</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6218%3A%20Cross%20Site%20Scripting%20in%20aandrew-me%20ytDownloader&amp;severity=medium&amp;id=69dd563d82d89c981f59ffe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32272-cwe-89-improper-neutralization-of-s-d6729621</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32272%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69dd563d82d89c981f59ffd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32271-cwe-89-improper-neutralization-of-s-99cfae41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32271%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69dd563d82d89c981f59ffd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6216-cross-site-scripting-in-dbgate-0a91b1d3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6216%3A%20Cross%20Site%20Scripting%20in%20DbGate&amp;severity=medium&amp;id=69dd563d82d89c981f59ffe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32270-cwe-200-exposure-of-sensitive-infor-420217a6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32270%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20commerce&amp;severity=low&amp;id=69dd4f3582d89c981f535a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6215-server-side-request-forgery-in-dbgat-f0b18b6d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6215%3A%20Server-Side%20Request%20Forgery%20in%20DbGate&amp;severity=medium&amp;id=69de21bb82d89c981f275285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6202-sql-injection-in-code-projects-easy--bef2f821</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6202%3A%20SQL%20Injection%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69dd44ab82d89c981f46e105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6201-improper-access-controls-in-codeastr-5f178a95</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6201%3A%20Improper%20Access%20Controls%20in%20CodeAstro%20Online%20Job%20Portal&amp;severity=medium&amp;id=69dd44ab82d89c981f46e0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32605-cwe-125-out-of-bounds-read-in-nimiq-f8a5cdff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32605%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69dd44ab82d89c981f46e0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6200-stack-based-buffer-overflow-in-tenda-8a88ed16</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6200%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd3da482d89c981f3fccd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6199-stack-based-buffer-overflow-in-tenda-30cccc87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6199%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd3da482d89c981f3fccca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6198-stack-based-buffer-overflow-in-tenda-4cf4d0af</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6198%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd369b82d89c981f375085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40044-deserialization-of-untrusted-data-i-ddf575cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40044%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pancho%20Pachno&amp;severity=critical&amp;id=69dd369b82d89c981f37507a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40043-authorization-bypass-through-user-c-cd03f12c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40043%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pancho%20Pachno&amp;severity=high&amp;id=69dd369b82d89c981f375076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40042-exposure-of-file-descriptor-to-unin-57db4884</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40042%3A%20Exposure%20of%20File%20Descriptor%20to%20Unintended%20Control%20Sphere%20(&apos;File%20Descriptor%20Leak&apos;)%20in%20pancho%20Pachno&amp;severity=critical&amp;id=69dd369b82d89c981f375072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40041-cross-site-request-forgery-csrf-in--f30108bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40041%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pancho%20Pachno&amp;severity=medium&amp;id=69dd369b82d89c981f37506e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40040-unrestricted-upload-of-file-with-da-ac271a05</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40040%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pancho%20Pachno&amp;severity=high&amp;id=69dd369b82d89c981f37506a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40039-authentication-bypass-by-primary-we-45f81d73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40039%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20pancho%20Pachno&amp;severity=high&amp;id=69dd369b82d89c981f375066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40038-improper-neutralization-of-input-du-7c227709</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40038%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pancho%20Pachno&amp;severity=medium&amp;id=69dd369b82d89c981f375062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6197-stack-based-buffer-overflow-in-tenda-1b570bd7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6197%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd369b82d89c981f37507e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32316-cwe-122-heap-based-buffer-overflow--67a3b592</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32316%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20jqlang%20jq&amp;severity=high&amp;id=69dd2f9182d89c981f2dce11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6196-stack-based-buffer-overflow-in-tenda-d5008aaf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6196%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd2f9182d89c981f2dce15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6195-os-command-injection-in-totolink-a71-657b0a43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6195%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dd369e82d89c981f37511d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6100-cwe-416-use-after-free-in-python-sof-0f033ecb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6100%3A%20CWE-416%20Use%20after%20free%20in%20Python%20Software%20Foundation%20CPython&amp;severity=critical&amp;id=69dd2f9182d89c981f2dce1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6194-stack-based-buffer-overflow-in-totol-a26bfb9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6194%3A%20Stack-based%20Buffer%20Overflow%20in%20Totolink%20A3002MU&amp;severity=high&amp;id=69dd44ab82d89c981f46e10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28291-cwe-78-improper-neutralization-of-s-96ab636e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28291%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20steveukx%20git-js&amp;severity=high&amp;id=69de21bb82d89c981f27528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3756-cwe-1284-improper-validation-of-spec-7704dd12</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3756%3A%20CWE-1284%20Improper%20validation%20of%20specified%20quantity%20in%20input%20in%20ABB%20AC800M%20(System%20800xA)&amp;severity=high&amp;id=69dd369e82d89c981f37511a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6193-sql-injection-in-phpgurukul-daily-ex-c7eac9ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6193%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracking%20System&amp;severity=medium&amp;id=69de21bb82d89c981f275299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6192-integer-overflow-in-uclouvain-openjp-ef28e36c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6192%3A%20Integer%20Overflow%20in%20uclouvain%20openjpeg&amp;severity=medium&amp;id=69de21bb82d89c981f275290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39940-cwe-601-url-redirection-to-untruste-2a35287b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39940%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69dd1e0282d89c981f1b771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6191-sql-injection-in-itsourcecode-constr-e5549c5e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6191%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69dd1e0282d89c981f1b772c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6190-sql-injection-in-itsourcecode-constr-0f179bdd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6190%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69dd1e0282d89c981f1b7725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6189-sql-injection-in-sourcecodester-phar-96023dda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6189%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69dd1e0282d89c981f1b771e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31991-cwe-307-improper-restriction-of-exc-c5c21653</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31991%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20HCLSoftware%20Velocity&amp;severity=medium&amp;id=69dd138382d89c981f0e28d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6188-sql-injection-in-sourcecodester-phar-06fa6ee4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6188%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69dd138382d89c981f0e28e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6231-cwe-20-improper-input-validation-in--97f26bbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6231%3A%20CWE-20%20Improper%20input%20validation%20in%20MongoDB%20Inc.%20C%20Driver&amp;severity=medium&amp;id=69dd138382d89c981f0e28ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6187-sql-injection-in-sourcecodester-phar-aea1d8b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6187%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69dd138382d89c981f0e28df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6186-buffer-overflow-in-utt-hiper-1200gw-043a1972</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6186%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201200GW&amp;severity=high&amp;id=69dd0c8782d89c981f09c95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-reader-0-day-96bf67be</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Reader%200-day&amp;severity=medium&amp;id=69dd08e282d89c981f03878d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polymarket-trader-funds-at-risk-dprk-npm-package-s-2ee92661</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Polymarket%20Trader%20Funds%20at%20Risk%3A%20DPRK%20npm%20Package%20Steals%20Wallet%20Keys%20and%20Installs%20SSH%20Backdoor&amp;severity=medium&amp;id=69dd171882d89c981f125412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/live-c2-dump-recovering-every-stage-of-the-kill-ch-709bdb72</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Live%20C2%20Dump%20Recovering%20Every%20Stage%20of%20the%20Kill%20Chain%3A%20CHM%20Dropper%2C%20VBScript%20Stager%2C%20PowerShell%20Keylogger&amp;severity=medium&amp;id=69dd171882d89c981f12541a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-recruiter-campaign-targets-crypto-developers--85147d94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20recruiter%20campaign%20targets%20crypto%20developers%20with%20RAT&amp;severity=medium&amp;id=69dd137d82d89c981f0e1bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/refundee-inside-a-shadow-panel-phishing-as-a-servi-e71e8c6b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=REFUNDEE%3A%20Inside%20a%20Shadow%20Panel%20Phishing-as-a-Service%20Operation&amp;severity=medium&amp;id=69dd0fea82d89c981f0adb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-an-ottercookie-infostealer-campaign-acros-5d5ba2f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20an%20OtterCookie%20Infostealer%20Campaign%20Across%20npm&amp;severity=medium&amp;id=69dd0c6682d89c981f09ae9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6184-cross-site-scripting-in-code-project-ba5c4786</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6184%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Content%20Management%20System&amp;severity=medium&amp;id=69dd0c8782d89c981f09c954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1462-cwe-502-deserialization-of-untrusted-6e6c5fa9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1462%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20keras-team%20keras-team%2Fkeras&amp;severity=high&amp;id=69dd057082d89c981f016d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6183-sql-injection-in-code-projects-simpl-974105a8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6183%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Content%20Management%20System&amp;severity=medium&amp;id=69dd057082d89c981f016da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-targets-arabian-gulf-region-with-plug-40a84b9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Targets%20Arabian%20Gulf%20Region%20With%20PlugX&amp;severity=medium&amp;id=69dd01da82d89c981ff9dcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33858-cwe-502-deserialization-of-untruste-c129833d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33858%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69dd057082d89c981f016d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6182-sql-injection-in-code-projects-simpl-82289a0b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6182%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Content%20Management%20System&amp;severity=medium&amp;id=69dd057082d89c981f016d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-android-rat-turning-infected-devices-into-po-1b096751</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20Android%20RAT%20turning%20infected%20devices%20into%20potential%20residential%20proxy%20nodes&amp;severity=medium&amp;id=69dd01db82d89c981ff9dd2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bookingcom-says-hackers-accessed-user-information-fe24f788</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Booking.com%20Says%20Hackers%20Accessed%20User%20Information&amp;severity=medium&amp;id=69dcfe5782d89c981ff7af6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66236-cwe-532-insertion-of-sensitive-info-d9544988</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66236%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69dd057082d89c981f016d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-leverage-claude-code-leak-as-social--8f910002</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20Leverage%20Claude%20Code%20Leak%20as%20Social%20Engineering%20Lure%20to%20Distribute%20Malicious%20Payloads%20via%20GitHub&amp;severity=medium&amp;id=69dd01db82d89c981ff9dd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/browsergate-claims-of-linkedin-spying-clash-with-s-385b7592</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BrowserGate%3A%20Claims%20of%20LinkedIn%20%E2%80%98Spying%E2%80%99%20Clash%20With%20Security%20Research%20Findings&amp;severity=medium&amp;id=69dd0a1182d89c981f054399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/13th-april-threat-intelligence-report-88885a79</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=13th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69dceccf82d89c981fdf6988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scans-for-encystphp-webshell-mon-apr-13th-12c43e49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scans%20for%20EncystPHP%20Webshell%2C%20(Mon%2C%20Apr%2013th)&amp;severity=medium&amp;id=69dcecc482d89c981fdf6328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34476-cwe-918-server-side-request-forgery-d592247b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34476%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20SkyWalking%20MCP&amp;severity=high&amp;id=69dcecd082d89c981fdf6a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-impacted-by-north-korea-linked-axios-supply-db914e14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Impacted%20by%20North%20Korea-Linked%20Axios%20Supply%20Chain%20Hack&amp;severity=medium&amp;id=69dce5bb82d89c981fda16e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/international-operation-targets-multimillion-dolla-5525d62a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=International%20Operation%20Targets%20Multimillion-Dollar%20Crypto%20Theft%20Schemes&amp;severity=medium&amp;id=69dcd7ac82d89c981fc769bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-your-privacy-while-using-smart-sex--988c951e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20your%20privacy%20while%20using%20smart%20sex%20toys%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69dcd02982d89c981fbb38ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cpuid-hacked-to-serve-trojanized-cpu-z-and-hwmonit-7573c4c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CPUID%20Hacked%20to%20Serve%20Trojanized%20CPU-Z%20and%20HWMonitor%20Downloads&amp;severity=medium&amp;id=69dccd1f82d89c981fb6579e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-claude-website-distributes-plugx-rat-aa7431ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Claude%20Website%20Distributes%20PlugX%20RAT&amp;severity=medium&amp;id=69dcbf0f82d89c981f99f930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15632-cross-site-scripting-in-1panel-dev--7a3eba1c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15632%3A%20Cross%20Site%20Scripting%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dcbf1a82d89c981f9a03c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35337-cwe-502-deserialization-of-untruste-675b4697</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35337%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20Client&amp;severity=high&amp;id=69dcbf1a82d89c981f9a03d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35565-cwe-79-improper-neutralization-of-i-3f694165</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35565%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20UI&amp;severity=medium&amp;id=69dcbf1a82d89c981f9a03e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cpu-z-hwmonitor-cpuidcom-watering-hole-attack-f42e55fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CPU-Z%20%26%20HWMonitor%2C%20cpuid.com%2C%20Watering%20Hole%20Attack&amp;severity=medium&amp;id=69dcb11e82d89c981f84024d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4810-cwe-306-missing-authentication-for-c-90e44d82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4810%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Google%20Cloud%20Agent%20Development%20Kit%20(ADK)&amp;severity=critical&amp;id=69dcb49d82d89c981f86edcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gmail-brings-end-to-end-encryption-to-android-and--0642b6a6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gmail%20Brings%20End-to-End%20Encryption%20to%20Android%20and%20iOS%20for%20Enterprise%20Users&amp;severity=low&amp;id=69dca9f782d89c981f7d90e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0232-cwe-15-external-control-of-system-or-7ae8859f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0232%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Agent&amp;severity=medium&amp;id=69dc9f6d82d89c981f660387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0233-cwe-295-improper-certificate-validat-3fa76797</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0233%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Palo%20Alto%20Networks%20Autonomous%20Digital%20Experience%20Manager&amp;severity=low&amp;id=69dc9f6d82d89c981f66038a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0234-cwe-347-improper-verification-of-cry-77c20c64</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0234%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Palo%20Alto%20Networks%20Cortex%20XSOAR%20Microsoft%20Teams%20Marketplace&amp;severity=high&amp;id=69dc9f6d82d89c981f66038d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5936-cwe-918-server-side-request-forgery--703e707e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5936%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Services%20API&amp;severity=high&amp;id=69dcd01e82d89c981fbb28e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5085-cwe-340-generation-of-predictable-nu-b0e46b2d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5085%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20MCRAWFOR%20Solstice%3A%3ASession&amp;severity=critical&amp;id=69dcd01e82d89c981fbb28d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40436-cwe269-improper-privilege-managemen-3c704b13</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40436%3A%20CWE%E2%80%91269%20Improper%20Privilege%20Management%20in%20ZTE%20ZXEDM%20iEMS&amp;severity=high&amp;id=69dcd01e82d89c981fbb28d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6168-stack-based-buffer-overflow-in-totol-926c3f9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6168%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A7000R&amp;severity=high&amp;id=69dcd01f82d89c981fbb2903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6167-sql-injection-in-code-projects-facul-930b857e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6167%3A%20SQL%20Injection%20in%20code-projects%20Faculty%20Management%20System&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34866-cwe-120-buffer-copy-without-checkin-299fb76a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34866%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34865-cwe-122-heap-based-buffer-overflow--f39e88a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34865%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=69dcd01e82d89c981fbb28bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6166-sql-injection-in-code-projects-vehic-a755d753</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6166%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3830-cwe-89-sql-injection-in-product-filt-8d62abb0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3830%3A%20CWE-89%20SQL%20Injection%20in%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=high&amp;id=69dcd01e82d89c981fbb28cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15441-cwe-89-sql-injection-in-form-maker--b9ba0370</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15441%3A%20CWE-89%20SQL%20Injection%20in%20Form%20Maker%20by%2010Web&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6165-sql-injection-in-code-projects-vehic-c4e85e3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6165%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc86f082d89c981f39d666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6164-sql-injection-in-code-projects-lost--96df4a92</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6164%3A%20SQL%20Injection%20in%20code-projects%20Lost%20and%20Found%20Thing%20Management&amp;severity=medium&amp;id=69dc86f082d89c981f39d65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6163-sql-injection-in-code-projects-lost--716fd1d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6163%3A%20SQL%20Injection%20in%20code-projects%20Lost%20and%20Found%20Thing%20Management&amp;severity=medium&amp;id=69dc86f082d89c981f39d657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21010-cwe-20-improper-input-validation-in-46318ce4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21010%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21008-cwe-200-exposure-of-sensitive-infor-f4dc6453</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21008%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40447-cwe-190-integer-overflow-or-wraparo-b9281796</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40447%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21014-cwe-284-improper-access-control-in--1fe32321</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21014%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Camera&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21013-cwe-276-incorrect-default-permissio-2eb54624</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21013%3A%20CWE-276%3A%20Incorrect%20Default%20Permission%20in%20Samsung%20Mobile%20Galaxy%20Wearable&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21012-cwe-73-external-control-of-file-nam-0e39053f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21012%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21011-cwe-266-incorrect-privilege-assignm-7ca30c25</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21011%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21009-cwe-754-improper-check-for-unusual--5cdeb51a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21009%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21007-cwe-754-improper-check-for-unusual--3067d701</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21007%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21006-cwe-284-improper-access-control-in--f34ac3c1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21006%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6162-cross-site-scripting-in-phpgurukul-c-943de151</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6162%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=69dc7c4a82d89c981f24c393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21003-cwe-20-improper-input-validation-in-428207a8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21003%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40446-cwe-843-access-of-resource-using-in-c8f86d8b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40446%3A%20CWE-843%20Access%20of%20resource%20using%20incompatible%20type%20(&apos;type%20confusion&apos;)%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc7c4782d89c981f24c288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25209-cwe-125-out-of-bounds-read-in-samsu-a8f7687c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25209%3A%20CWE-125%20Out-of-bounds%20read%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25208-cwe-190-integer-overflow-or-wraparo-e8a94f50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25208%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=high&amp;id=69dc7c4582d89c981f24c1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25207-cwe-787-out-of-bounds-write-in-sams-4980e58e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25207%3A%20CWE-787%20Out-of-bounds%20write%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=high&amp;id=69dc7c4582d89c981f24c1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6161-sql-injection-in-code-projects-simpl-2248136e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6161%3A%20SQL%20Injection%20in%20code-projects%20Simple%20ChatBox&amp;severity=medium&amp;id=69dc7c4a82d89c981f24c38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25206-cwe-125-out-of-bounds-read-in-samsu-d749862b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25206%3A%20CWE-125%20Out-of-bounds%20read%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25205-cwe-122-heap-based-buffer-overflow--4584a89e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25205%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=high&amp;id=69dc7c4582d89c981f24c1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6160-file-and-directory-information-expos-fa73f35f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6160%3A%20File%20and%20Directory%20Information%20Exposure%20in%20code-projects%20Simple%20ChatBox&amp;severity=medium&amp;id=69dc7c4a82d89c981f24c385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6159-cross-site-scripting-in-code-project-c7655aab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6159%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20ChatBox&amp;severity=medium&amp;id=69dc7c4782d89c981f24c292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34864-cwe-119-improper-restriction-of-ope-7e86aa19</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34864%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34863-cwe-787-out-of-bounds-write-in-huaw-e3f550ca</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34863%3A%20CWE-787%20Out-of-bounds%20write%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34862-cwe-362-concurrent-execution-using--0efce1e5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34862%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34861-cwe-362-concurrent-execution-using--2cbedd77</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34861%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34859-cwe-416-use-after-free-in-huawei-ha-5f3182f4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34859%3A%20CWE-416%20Use%20after%20free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34858-cwe-362-concurrent-execution-using--7cfd5c85</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34858%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34857-cwe-362-concurrent-execution-using--717a190f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34857%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35553-stack-based-buffer-overflow-in-dyna-e28ddf92</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35553%3A%20Stack-based%20buffer%20overflow%20in%20Dynabook%20Inc.%20TOSRFEC.SYS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34855-cwe-20-improper-input-validation-in-fab36aeb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34855%3A%20CWE-20%20Improper%20input%20validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34854-cwe-416-use-after-free-in-huawei-ha-a4c7ceb2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34854%3A%20CWE-416%20Use%20after%20free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6158-os-command-injection-in-totolink-n30-6e3cef0c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6158%3A%20OS%20Command%20Injection%20in%20Totolink%20N300RH&amp;severity=medium&amp;id=69dc7c4782d89c981f24c28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34849-cwe-362-concurrent-execution-using--0ae21aaa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34849%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69dc7c4582d89c981f24c1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34856-cwe-362-concurrent-execution-using--b615401f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34856%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69dc6aaf82d89c981fecb079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34853-cwe-270-privilege-context-switching-47f2dae2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34853%3A%20CWE-270%20Privilege%20context%20switching%20error%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69dc6aaf82d89c981fecb075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28553-cwe-275-permission-issues-in-huawei-ad31a06e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28553%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34867-cwe-415-double-free-in-huawei-harmo-34799778</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34867%3A%20CWE-415%20Double%20free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34860-cwe-284-improper-access-control-in--0d2249cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34860%3A%20CWE-284%20Improper%20Access%20Control%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34852-cwe-835-loop-with-unreachable-exit--538938f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34852%3A%20CWE-835%20Loop%20with%20unreachable%20exit%20condition%20(&apos;infinite%20loop&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6157-buffer-overflow-in-totolink-a800r-47a7fe50</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6157%3A%20Buffer%20Overflow%20in%20Totolink%20A800R&amp;severity=high&amp;id=69dc6ab182d89c981fecb370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34851-cwe-362-concurrent-execution-using--40f83c52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34851%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69dc6aaf82d89c981fecb06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34850-cwe-362-concurrent-execution-using--4b5d699d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34850%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69dc6aaf82d89c981fecb068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6156-os-command-injection-in-totolink-a71-061dc469</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6156%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc6ab182d89c981fecb369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6155-os-command-injection-in-totolink-a71-7391e9c3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6155%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc6ab182d89c981fecb362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6154-os-command-injection-in-totolink-a71-87e9e42c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6154%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc6aaf82d89c981fecb08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6153-sql-injection-in-code-projects-vehic-31081b24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6153%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6152-sql-injection-in-code-projects-vehic-235da6a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6152%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6179-cwe-79-improper-neutralization-of-in-f9fe77cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6179%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20FPT%20Software%20NightWolf%20Penetration%20Testing%20Platform&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6151-sql-injection-in-code-projects-vehic-256441ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6151%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6150-cross-site-scripting-in-code-project-deba8bdf</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6150%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-april-13th-2026-httpsiscs-13a5275d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20April%2013th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9888%2C%20(Mon%2C%20Apr%2013th)&amp;severity=medium&amp;id=69dc4e8f82d89c981fb3cbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6149-sql-injection-in-code-projects-vehic-9d23061b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6149%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc4b0b82d89c981fa7dfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6148-sql-injection-in-code-projects-vehic-bd615293</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6148%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc4b0b82d89c981fa7dfd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6143-permissive-cross-domain-policy-with--b3323dd8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6143%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20farion1231%20cc-switch&amp;severity=medium&amp;id=69dc4b0b82d89c981fa7dfc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6142-sql-injection-in-tushar-2223-hotel-m-4439ac4c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6142%3A%20SQL%20Injection%20in%20tushar-2223%20Hotel%20Management%20System&amp;severity=medium&amp;id=69dc440382d89c981fa0ac0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25204-cwe-502-deserialization-of-untruste-10355b57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25204%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc440382d89c981fa0abf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6141-os-command-injection-in-danielmiessl-45304d9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6141%3A%20OS%20Command%20Injection%20in%20danielmiessler%20Personal_AI_Infrastructure&amp;severity=medium&amp;id=69dc440382d89c981fa0ac05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6140-os-command-injection-in-totolink-a71-8e1c7584</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6140%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc440382d89c981fa0abfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6139-os-command-injection-in-totolink-a71-92890d24</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6139%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc440382d89c981fa0abf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6138-os-command-injection-in-totolink-a71-a4d695c6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6138%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc35f382d89c981f798832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-14-aae7f576</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-14&amp;severity=medium&amp;id=69de33af82d89c981f2f83c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-13-425403c0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-13&amp;severity=medium&amp;id=69dd876a82d89c981f91c0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26460-na-18771092</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26460%3A%20n%2Fa&amp;severity=medium&amp;id=69dd59c182d89c981f5d4d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70936-na-3e41b6df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70936%3A%20n%2Fa&amp;severity=medium&amp;id=69dd59c182d89c981f5d4d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31280-na-efadddcc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31280%3A%20n%2Fa&amp;severity=medium&amp;id=69dd563d82d89c981f59ffce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51414-na-91604ecd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51414%3A%20n%2Fa&amp;severity=high&amp;id=69dd563d82d89c981f59ffca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31048-na-cb39c07b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31048%3A%20n%2Fa&amp;severity=critical&amp;id=69dd44ab82d89c981f46e0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29955-na-ff239336</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29955%3A%20n%2Fa&amp;severity=high&amp;id=69dd369b82d89c981f37505e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36952-na-b681ec7b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36952%3A%20n%2Fa&amp;severity=low&amp;id=69dd1e0282d89c981f1b7717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36950-na-ccb4d705</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36950%3A%20n%2Fa&amp;severity=low&amp;id=69dd1e0282d89c981f1b7714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36948-na-73e247d5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36948%3A%20n%2Fa&amp;severity=high&amp;id=69dd1e0282d89c981f1b7710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36938-na-6e422029</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36938%3A%20n%2Fa&amp;severity=low&amp;id=69dd138382d89c981f0e28dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36937-na-01c3f985</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36937%3A%20n%2Fa&amp;severity=low&amp;id=69dd138382d89c981f0e28d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63743-na-26e8c8c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63743%3A%20n%2Fa&amp;severity=medium&amp;id=69dd138382d89c981f0e28d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69627-na-7e25f884</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69627%3A%20n%2Fa&amp;severity=high&amp;id=69dd0c8782d89c981f09c950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69624-na-547e4d69</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69624%3A%20n%2Fa&amp;severity=high&amp;id=69dd0c8782d89c981f09c94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66769-na-b9a9fdef</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66769%3A%20n%2Fa&amp;severity=high&amp;id=69dd0c8782d89c981f09c949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36941-na-44ede602</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36941%3A%20n%2Fa&amp;severity=low&amp;id=69dd057082d89c981f016d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30999-na-8fbedab9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30999%3A%20n%2Fa&amp;severity=high&amp;id=69dd057082d89c981f016d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30998-na-8cbe983f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30998%3A%20n%2Fa&amp;severity=high&amp;id=69dd057082d89c981f016d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30997-na-b89c6367</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30997%3A%20n%2Fa&amp;severity=high&amp;id=69dd057082d89c981f016d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36945-na-17861145</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36945%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36944-na-f9de8d02</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36944%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36943-na-41506e89</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36943%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36942-na-b4d79b66</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36942%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31283-na-a7ddfa0d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31283%3A%20n%2Fa&amp;severity=critical&amp;id=69dcfe7a82d89c981ff7d604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31282-na-88dbd640</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31282%3A%20n%2Fa&amp;severity=critical&amp;id=69dcfe7a82d89c981ff7d600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31281-na-2b1c5812</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31281%3A%20n%2Fa&amp;severity=high&amp;id=69dcfe7a82d89c981ff7d5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29628-na-e13f5148</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29628%3A%20n%2Fa&amp;severity=medium&amp;id=69dcfe7a82d89c981ff7d5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36947-na-8bda4b83</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36947%3A%20n%2Fa&amp;severity=low&amp;id=69dcf3cf82d89c981fee9b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36946-na-1cc0a2fa</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36946%3A%20n%2Fa&amp;severity=low&amp;id=69dcf3cf82d89c981fee9b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36923-na-84469258</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36923%3A%20n%2Fa&amp;severity=low&amp;id=69dcecd082d89c981fdf6a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36922-na-ecbf239b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36922%3A%20n%2Fa&amp;severity=low&amp;id=69dcecd082d89c981fdf6a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36920-na-3b139a32</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36920%3A%20n%2Fa&amp;severity=low&amp;id=69dcecd082d89c981fdf6a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36919-na-2c9e4158</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36919%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36874-na-12d6a30b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36874%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36873-na-5c465477</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36873%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36872-na-b4ff357e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36872%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-13-91de2cd6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-13&amp;severity=low&amp;id=69dc86e282d89c981f39b609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6137-stack-based-buffer-overflow-in-tenda-189c6cd1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6137%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc327182d89c981f768b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6136-stack-based-buffer-overflow-in-tenda-fb08e76b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6136%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc2f0082d89c981f6be0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6135-stack-based-buffer-overflow-in-tenda-3254f476</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6135%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc2b6782d89c981f6938cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6134-stack-based-buffer-overflow-in-tenda-c1d0d543</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6134%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc27e482d89c981f652da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6133-stack-based-buffer-overflow-in-tenda-3b6543ea</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6133%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc245f82d89c981f62f978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6132-os-command-injection-in-totolink-a71-401747c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6132%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc20db82d89c981f45ab3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6131-os-command-injection-in-totolink-a71-ce3a9dd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6131%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc1d5782d89c981f304cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6130-os-command-injection-in-chatboxai-ch-705fc80d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6130%3A%20OS%20Command%20Injection%20in%20chatboxai%20chatbox&amp;severity=medium&amp;id=69dc19d482d89c981f05d631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6129-missing-authentication-in-zhayujie-c-9a9de156</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6129%3A%20Missing%20Authentication%20in%20zhayujie%20chatgpt-on-wechat%20CowAgent&amp;severity=medium&amp;id=69dbfa3282d89c981fc610c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40396-cwe-670-always-incorrect-control-fl-7bfc9c43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40396%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=69dbf32682d89c981fb00945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40395-cwe-770-allocation-of-resources-wit-311788da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40395%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20varnish-software%20Varnish%20Enterprise&amp;severity=medium&amp;id=69dbf32682d89c981fb00942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40394-cwe-670-always-incorrect-control-fl-e713a1d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40394%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=69dbf32682d89c981fb0093f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40393-cwe-787-out-of-bounds-write-in-mesa-fa5bea91</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40393%3A%20CWE-787%20Out-of-bounds%20Write%20in%20mesa3d%20Mesa&amp;severity=high&amp;id=69dbefa382d89c981fa9bf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40386-cwe-191-integer-underflow-wrap-or-w-d3d5978b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40386%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20libexif%20project%20libexif&amp;severity=medium&amp;id=69dbe51682d89c981fa14164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40385-cwe-190-integer-overflow-or-wraparo-223f5288</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40385%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20libexif%20project%20libexif&amp;severity=medium&amp;id=69dbe51682d89c981fa14161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6126-missing-authentication-in-zhayujie-c-501c13d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6126%3A%20Missing%20Authentication%20in%20zhayujie%20chatgpt-on-wechat%20CowAgent&amp;severity=medium&amp;id=69db781b82d89c981f3d4477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6125-code-injection-in-dromara-warm-flow-8c53d100</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6125%3A%20Code%20Injection%20in%20Dromara%20warm-flow&amp;severity=medium&amp;id=69db6d8f82d89c981f360dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6124-stack-based-buffer-overflow-in-tenda-4ff35eb5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6124%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db630382d89c981f2e65bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6123-stack-based-buffer-overflow-in-tenda-96a0216c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6123%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db7e7c82d89c981f416476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-reader-zero-day-exploited-for-months-cd76f82f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Reader%20Zero-Day%20Exploited%20for%20Months&amp;severity=medium&amp;id=69db4deb82d89c981f1a302e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6122-stack-based-buffer-overflow-in-tenda-40cd8adb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6122%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db517682d89c981f1ce65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6121-stack-based-buffer-overflow-in-tenda-e3f9272e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db4a6682d89c981f186e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6120-stack-based-buffer-overflow-in-tenda-54bc050c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6120%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db38d382d89c981f09b1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6119-server-side-request-forgery-in-astrb-c678b667</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6119%3A%20Server-Side%20Request%20Forgery%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69db31ca82d89c981f05ff23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6118-command-injection-in-astrbotdevs-ast-ac56d615</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6118%3A%20Command%20Injection%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69db273e82d89c981fe5dd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6117-sandbox-issue-in-astrbotdevs-astrbot-00abdc7e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6117%3A%20Sandbox%20Issue%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69db273e82d89c981fe5dd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6116-os-command-injection-in-totolink-a71-15ee14e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6116%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db273e82d89c981fe5dd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6115-os-command-injection-in-totolink-a71-2eb78416</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6115%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db273e82d89c981fe5dd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6114-os-command-injection-in-totolink-a71-384165a1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6114%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db193e82d89c981fd60368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6113-os-command-injection-in-totolink-a71-16ad03cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6113%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db193e82d89c981fd60361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6112-os-command-injection-in-totolink-a71-83c5f182</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6112%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db193e82d89c981fd6035a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6111-server-side-request-forgery-in-found-2c681ea1</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6111%3A%20Server-Side%20Request%20Forgery%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69db079a82d89c981fa08bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1116-cwe-79-improper-neutralization-of-in-c711f067</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69db079a82d89c981fa08be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6110-code-injection-in-foundationagents-m-f4c02c00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6110%3A%20Code%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69db079a82d89c981fa08be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6109-cross-site-request-forgery-in-founda-03848c85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6109%3A%20Cross-Site%20Request%20Forgery%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69daf99182d89c981f7b7ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6108-os-command-injection-in-1panel-dev-m-0d8b3931</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6108%3A%20OS%20Command%20Injection%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69db7e7c82d89c981f416488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6107-cross-site-scripting-in-1panel-dev-m-f1e01e0b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6107%3A%20Cross%20Site%20Scripting%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69db7e7c82d89c981f41647e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-13-b0fcb029</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-13&amp;severity=medium&amp;id=69dd136882d89c981f0d7575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-12-7b4cc969</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-12&amp;severity=medium&amp;id=69dc35ea82d89c981f7953ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-12-bd47b229</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-12&amp;severity=low&amp;id=69db667e82d89c981f307658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6106-cross-site-scripting-in-1panel-dev-m-cd592a06</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6106%3A%20Cross%20Site%20Scripting%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dacbd682d89c981f306a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6105-improper-authorization-in-perfree-go-21e2d196</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6105%3A%20Improper%20Authorization%20in%20perfree%20go-fastdfs-web&amp;severity=medium&amp;id=69dac85b82d89c981f2de9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31845-cwe-79-improper-neutralization-of-i-5f1f2c55</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Rukovoditel%20Rukovoditel%20CRM&amp;severity=critical&amp;id=69da972082d89c981f082366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23900-cwe-79-improper-neutralization-of-i-e50d7564</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phoca.cz%20phoca.cz%20-%20Phoca%20Maps%20for%20Joomla&amp;severity=medium&amp;id=69da4d4882d89c981fd2d7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5809-cwe-73-external-control-of-file-name-7d1ff4ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5809%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=69da00db1cc7ad14da61c7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34621-improperly-controlled-modification--1b9951d5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34621%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20(CWE-1321)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69da15f41cc7ad14da6d013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3371-cwe-639-authorization-bypass-through-6e97df2c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3371%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69d9a5741cc7ad14da144113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4979-cwe-918-server-side-request-forgery--5030e4e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4979%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=69d9a5741cc7ad14da144129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5144-cwe-269-improper-privilege-managemen-f1535bf6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5144%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20boonebgorges%20BuddyPress%20Groupblog&amp;severity=high&amp;id=69d9a5741cc7ad14da144131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3498-cwe-79-improper-neutralization-of-in-2f47cf95</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpblockart%20BlockArt%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20Blocks%20%2CWordPress%20Block%20Plugin%2C%20Sections%20%26%20Template%20Library&amp;severity=medium&amp;id=69d9a5741cc7ad14da14411a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4895-cwe-79-improper-neutralization-of-in-4c0d635b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69d9a5741cc7ad14da144120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5217-cwe-79-improper-neutralization-of-in-49825cdd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Optimole%20%E2%80%93%20Optimize%20Images%20in%20Real%20Time&amp;severity=high&amp;id=69d9a5741cc7ad14da144142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5207-cwe-89-improper-neutralization-of-sp-9d26e41a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5207%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WP%20LMS%20for%20eLearning%2C%20Online%20Courses%2C%20%26%20Quizzes&amp;severity=medium&amp;id=69d9a5741cc7ad14da14413b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5226-cwe-79-improper-neutralization-of-in-a73b4818</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Optimole%20%E2%80%93%20Optimize%20Images%20in%20Real%20Time&amp;severity=medium&amp;id=69d9a5741cc7ad14da14414b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3358-cwe-862-missing-authorization-in-the-541a13ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3358%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69d9a5741cc7ad14da14410a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40354-cwe-61-unix-symbolic-link-symlink-f-067082f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40354%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Flatpak%20xdg-desktop-portal&amp;severity=low&amp;id=69d99e6e1cc7ad14da1225aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4157-cwe-78-improper-neutralization-of-sp-e916d229</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4157%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ChargePoint%20Home%20Flex&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4156-cwe-121-stack-based-buffer-overflow--4cc3f2ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4156%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ChargePoint%20Home%20Flex&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4155-cwe-540-inclusion-of-sensitive-infor-6f8550d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4155%3A%20CWE-540%3A%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20ChargePoint%20Home%20Flex&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5495-cwe-787-out-of-bounds-write-in-labce-29682a54</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5495%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5494-cwe-787-out-of-bounds-write-in-labce-1c6b705a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5494%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5493-cwe-787-out-of-bounds-write-in-labce-65326a90</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5493%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5496-cwe-843-access-of-resource-using-inc-83683539</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5496%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4149-cwe-119-improper-restriction-of-oper-dcf90312</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4149%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Sonos%20Era%20300&amp;severity=critical&amp;id=69d99e6e1cc7ad14da1225b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-12-83aa8314</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-12&amp;severity=medium&amp;id=69dbf6a382d89c981fb12448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-11-b2ee18dd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-11&amp;severity=medium&amp;id=69dae46a82d89c981f441f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-11-870bf8db</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-11&amp;severity=low&amp;id=69d9ba841cc7ad14da1f0f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40199-cwe-130-improper-handling-of-length-73de8518</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40199%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20STIGTSP%20Net%3A%3ACIDR%3A%3ALite&amp;severity=medium&amp;id=69d9743b1cc7ad14daee2672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40198-cwe-1286-improper-validation-of-syn-dbf39b2e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40198%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20STIGTSP%20Net%3A%3ACIDR%3A%3ALite&amp;severity=high&amp;id=69d9743b1cc7ad14daee266d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33118-spoofing-in-microsoft-microsoft-edg-828099eb</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33118%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69d96d341cc7ad14daec12be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33119-cwe-451-user-interface-ui-misrepres-3c84bf78</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33119%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=69d96d341cc7ad14daec12c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5724-cwe-306-missing-authentication-for-c-2cb7d2d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5724%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Temporal%20Technologies%2C%20Inc.%20temporal&amp;severity=medium&amp;id=69d969b01cc7ad14daeabe2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40252-cwe-284-improper-access-control-in--2ccbdf06</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40252%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20labring%20FastGPT&amp;severity=medium&amp;id=69d9662c1cc7ad14dae9687b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40242-cwe-918-server-side-request-forgery-5eaaa2b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40242%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20getarcaneapp%20arcane&amp;severity=high&amp;id=69d962a81cc7ad14dae87051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40191-cwe-863-incorrect-authorization-in--1c3e33a9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40191%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=medium&amp;id=69d95f431cc7ad14dae72c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40190-cwe-1321-improperly-controlled-modi-f84ee3e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40190%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20langchain-ai%20langsmith-sdk&amp;severity=medium&amp;id=69d9581c1cc7ad14dae48c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40189-cwe-862-missing-authorization-in-pa-3a1ae9b4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40189%3A%20CWE-862%3A%20Missing%20Authorization%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d9581c1cc7ad14dae48c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40188-cwe-1314-missing-write-protection-f-3b40b321</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40188%3A%20CWE-1314%3A%20Missing%20Write%20Protection%20for%20Parametric%20Data%20Values%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69d9581c1cc7ad14dae48c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40185-cwe-862-missing-authorization-in-ma-0fd98725</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40185%3A%20CWE-862%3A%20Missing%20Authorization%20in%20mauriceboe%20TREK&amp;severity=high&amp;id=69d9581c1cc7ad14dae48c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40184-cwe-306-missing-authentication-for--4af6e206</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40184%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20mauriceboe%20TREK&amp;severity=low&amp;id=69d9581c1cc7ad14dae48c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40180-cwe-22-improper-limitation-of-a-pat-9f8db994</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40180%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20quarkiverse%20quarkus-openapi-generator&amp;severity=high&amp;id=69d9581c1cc7ad14dae48c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40168-cwe-918-server-side-request-forgery-e96b88f9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40168%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69d9d9721cc7ad14da3f862a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27460-cwe-409-improper-handling-of-highly-1160e850</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27460%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0fae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33737-cwe-611-improper-restriction-of-xml-c825261b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33737%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0faf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33736-cwe-639-authorization-bypass-throug-7ed8eb06</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33736%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0faf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33710-cwe-330-use-of-insufficiently-rando-14b6a24b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33710%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d94d8f1cc7ad14dae0faf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33708-cwe-862-missing-authorization-in-ch-c3c25773</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33708%3A%20CWE-862%3A%20Missing%20Authorization%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0faec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33707-cwe-640-weak-password-recovery-mech-2af5871d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33707%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69d94d8f1cc7ad14dae0fae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33706-cwe-269-improper-privilege-manageme-125a7abd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33706%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d94d8f1cc7ad14dae0fae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33705-cwe-538-insertion-of-sensitive-info-00b761cb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33705%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d9d9721cc7ad14da3f8633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33704-cwe-434-unrestricted-upload-of-file-9f5d6a2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33704%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d9d9721cc7ad14da3f862f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33703-cwe-639-authorization-bypass-throug-cb9e803c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33703%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d943121cc7ad14dadcb1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3446-vulnerability-in-python-software-fou-9e529bcb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3446%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69d943121cc7ad14dadcb1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33702-cwe-639-authorization-bypass-throug-925fbc0e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33702%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d943121cc7ad14dadcb19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33698-cwe-552-files-or-directories-access-2b2046ff</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33698%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69d943121cc7ad14dadcb199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33618-cwe-95-improper-neutralization-of-d-d093150c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33618%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d943121cc7ad14dadcb195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33141-cwe-639-authorization-bypass-throug-8ba8b98b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33141%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d93c061cc7ad14dada4d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32892-cwe-78-improper-neutralization-of-s-5b2019d4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32892%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69d93c061cc7ad14dada4d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1502-vulnerability-in-python-software-fou-d29a3a25</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1502%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69d93c061cc7ad14dada4d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32932-cwe-601-url-redirection-to-untruste-630b1042</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32932%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d93c061cc7ad14dada4d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32931-cwe-434-unrestricted-upload-of-file-4bedfb62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32931%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d93c061cc7ad14dada4d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32930-cwe-639-authorization-bypass-throug-898438cc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32930%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d93c061cc7ad14dada4d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32894-cwe-476-null-pointer-dereference-in-cef4e8af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32894%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad95287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32893-cwe-79-improper-neutralization-of-i-7ad4ff8e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32893%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d938791cc7ad14dad95283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31941-cwe-918-server-side-request-forgery-eae47332</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31941%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad9527e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31940-cwe-384-session-fixation-in-chamilo-5447c6f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31940%3A%20CWE-384%3A%20Session%20Fixation%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad95279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5483-insertion-of-sensitive-information-i-7240e491</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5483%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%202.16&amp;severity=high&amp;id=69d938791cc7ad14dad9528c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31939-cwe-22-improper-limitation-of-a-pat-40f7a66b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31939%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad95274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-your-organization-from-airsnitch-wi-37876665</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20your%20organization%20from%20AirSnitch%20Wi-Fi%20vulnerabilities%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d931771cc7ad14dad5c79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40160-cwe-918-server-side-request-forgery-ff80f530</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40160%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=high&amp;id=69d9d9751cc7ad14da3f8720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40159-cwe-200-exposure-of-sensitive-infor-d2289657</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40159%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f871d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40158-cwe-94-improper-control-of-generati-fa9a72f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40158%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d9d9721cc7ad14da3f863d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40157-cwe-22-improper-limitation-of-a-pat-3d24639a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40157%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d9d9751cc7ad14da3f871a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40156-cwe-94-improper-control-of-generati-73f8ee37</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40156%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d9d9721cc7ad14da3f8650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40100-cwe-918-server-side-request-forgery-a0467b74</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40100%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=69d9d9721cc7ad14da3f864d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40097-cwe-129-improper-validation-of-arra-afec90ff</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40097%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20smallstep%20certificates&amp;severity=low&amp;id=69d9d9721cc7ad14da3f8637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40074-cwe-755-improper-handling-of-except-ab3c4168</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40074%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20sveltejs%20kit&amp;severity=medium&amp;id=69d9d9721cc7ad14da3f8648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40073-cwe-770-allocation-of-resources-wit-94ac7182</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40073%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20sveltejs%20kit&amp;severity=high&amp;id=69d9d9721cc7ad14da3f8643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40086-cwe-22-improper-limitation-of-a-pat-26967144</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40086%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danielgatis%20rembg&amp;severity=medium&amp;id=69d943121cc7ad14dadcb1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40103-cwe-836-use-of-password-hash-instea-cc9ae4f5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40103%3A%20CWE-836%3A%20Use%20of%20Password%20Hash%20Instead%20of%20Password%20for%20Authentication%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35602-cwe-770-allocation-of-resources-wit-179f6de2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35602%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35601-cwe-93-improper-neutralization-of-c-b8fd76dd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35601%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f873b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35600-cwe-79-improper-neutralization-of-i-e4d51935</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35600%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35599-cwe-407-inefficient-algorithmic-com-60e6d707</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35599%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d943121cc7ad14dadcb1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35598-cwe-862-missing-authorization-in-go-9155d27b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35598%3A%20CWE-862%3A%20Missing%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f872f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35597-cwe-307-improper-restriction-of-exc-f368b092</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35597%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35596-cwe-863-incorrect-authorization-in--fcc1ca1b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35596%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35595-cwe-269-improper-privilege-manageme-a259bb47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35595%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69d943121cc7ad14dadcb1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35594-cwe-613-insufficient-session-expira-e2a90dbd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35594%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40023-cwe-116-improper-encoding-or-escapi-f19f4564</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40023%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4cxx&amp;severity=medium&amp;id=69d91fe11cc7ad14dacba377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34727-cwe-287-improper-authentication-in--cfd9d51e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34727%3A%20CWE-287%3A%20Improper%20Authentication%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69d91fde1cc7ad14dacba297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40021-cwe-116-improper-encoding-or-escapi-a5bdd51d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40021%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4net&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34481-cwe-116-improper-encoding-or-escapi-067c8388</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34481%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20JSON%20Template%20Layout&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34480-cwe-116-improper-encoding-or-escapi-b2386ff0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34480%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34479-cwe-116-improper-encoding-or-escapi-6c8114de</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34479%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%201%20to%20Log4j%202%20bridge&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34478-cwe-684-incorrect-provision-of-spec-8f1d16cd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34478%3A%20CWE-684%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34477-cwe-297-improper-validation-of-cert-d4dde496</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34477%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29043-cwe-122-heap-based-buffer-overflow--273d2e09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29043%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20HDFGroup%20hdf5&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-cyberattack-stings-stryker-windows-z-4d4a8d15</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Cyberattack%20Stings%20Stryker%2C%20Windows%20Zero-Day%2C%20China%20Supercomputer%20Hack&amp;severity=medium&amp;id=69d90e481cc7ad14dac44e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-networks-patches-dozens-of-junos-os-vulner-fe030f73</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20Networks%20Patches%20Dozens%20of%20Junos%20OS%20Vulnerabilities&amp;severity=critical&amp;id=69d900381cc7ad14dabf8a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40217-cwe-420-unprotected-alternate-chann-f9abccd5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40217%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20BerriAI%20LiteLLM&amp;severity=high&amp;id=69d907431cc7ad14dac20a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58920-cwe-79-improper-neutralization-of-i-c9e7ee08</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zootemplate%20Cerato&amp;severity=high&amp;id=69d900441cc7ad14dabf8fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58913-cwe-98-improper-control-of-filename-a903f3ae</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58913%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CactusThemes%20VideoPro&amp;severity=high&amp;id=69d900441cc7ad14dabf8fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5804-cwe-98-improper-control-of-filename--57692503</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5804%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Case%20Themes%20Case%20Theme%20User&amp;severity=high&amp;id=69d900441cc7ad14dabf8fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33092-cwe-15-in-acronis-acronis-true-imag-376576fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33092%3A%20CWE-15%20in%20Acronis%20Acronis%20True%20Image%20OEM&amp;severity=high&amp;id=69d900441cc7ad14dabf8fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/industry-reactions-to-iran-hacking-ics-in-critical-f621dd3a</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Industry%20Reactions%20to%20Iran%20Hacking%20ICS%20in%20Critical%20Infrastructure%3A%20Feedback%20Friday&amp;severity=critical&amp;id=69d8f2271cc7ad14dab982a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5412-cwe-285-improper-authorization-in-ca-2eb08bc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5412%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Canonical%20Juju&amp;severity=critical&amp;id=69d8f2321cc7ad14dab98423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5774-cwe-362-concurrent-execution-using-s-9ae612a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5774%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Canonical%20Juju&amp;severity=medium&amp;id=69d9d97c1cc7ad14da3f88ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/orthanc-dicom-vulnerabilities-lead-to-crashes-rce-36ef54de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Orthanc%20DICOM%20Vulnerabilities%20Lead%20to%20Crashes%2C%20RCE&amp;severity=low&amp;id=69d8e79b1cc7ad14dab3dbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5777-cwe-306-missing-authentication-for-c-2883531c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5777%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20EGate%20Atom%203X%20Projector&amp;severity=high&amp;id=69d8e7a61cc7ad14dab3dea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39304-denial-of-service-via-out-of-memory-33ee0636</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39304%3A%20Denial%20of%20Service%20via%20Out%20of%20Memory%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Client&amp;severity=high&amp;id=69d8d98b1cc7ad14daad853a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-147-patches-60-vulnerabilities-including-tw-c47f3657</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20147%20Patches%2060%20Vulnerabilities%2C%20Including%20Two%20Critical%20Flaws%20Worth%20%2486%2C000&amp;severity=critical&amp;id=69d8d6081cc7ad14daac3dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-releases-fight-fraud-framework-12271865</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Releases%20Fight%20Fraud%20Framework&amp;severity=medium&amp;id=69d8cb7c1cc7ad14daa783bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4162-cwe-862-missing-authorization-in-roc-0356dad0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4162%3A%20CWE-862%20Missing%20Authorization%20in%20RocketGenius%20Gravity%20SMTP&amp;severity=high&amp;id=69d8c7f71cc7ad14daa5fce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6057-cwe-22-path-traversal-in-falkordb-fa-80645f49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6057%3A%20CWE-22%20Path%20Traversal%20in%20FalkorDB%20FalkorDB%20Browser&amp;severity=critical&amp;id=69d8c7f71cc7ad14daa5fce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-marimo-flaw-exploited-hours-after-public--82162d6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Marimo%20Flaw%20Exploited%20Hours%20After%20Public%20Disclosure&amp;severity=critical&amp;id=69d8c0a51cc7ad14daa30adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6042-inefficient-algorithmic-complexity-i-f62f8871</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6042%3A%20Inefficient%20Algorithmic%20Complexity%20in%20musl%20libc&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6038-sql-injection-in-code-projects-vehic-ca755ced</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6038%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa3534a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33457-cwe-140-improper-neutralization-of--5b1489cf</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33457%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33456-cwe-140-improper-neutralization-of--0f4aeaea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33456%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33455-cwe-140-improper-neutralization-of--9d5c22ba</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33455%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6037-sql-injection-in-code-projects-vehic-469cfa07</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6037%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6036-sql-injection-in-code-projects-vehic-c8c5a593</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6036%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-memory-loader-drops-screenconnect-03401746</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-Memory%20Loader%20Drops%20ScreenConnect&amp;severity=medium&amp;id=69d8ceff1cc7ad14daa9150b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-package-supply-chain-compromise-leads-to-rat-d-5471ad80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Package%20Supply%20Chain%20Compromise%20Leads%20to%20RAT%20Deployment&amp;severity=medium&amp;id=69d8cb821cc7ad14daa7855e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6035-cross-site-scripting-in-code-project-4b5e4f61</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6035%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-rolls-out-cookie-theft-protections-in-chrom-6d88d9a0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Rolls%20Out%20Cookie%20Theft%20Protections%20in%20Chrome&amp;severity=medium&amp;id=69d8abd81cc7ad14da99e7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6034-cross-site-scripting-in-code-project-dc8a4ac6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6034%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa3536d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5525-cwe-121-stack-based-buffer-overflow--eed490de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5525%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Notepad%2B%2B%20Project%20Notepad%2B%2B&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-finds-vulnerability-exposing-millions-of-0f3042e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Finds%20Vulnerability%20Exposing%20Millions%20of%20Android%20Crypto%20Wallet%20Users&amp;severity=medium&amp;id=69d8a8541cc7ad14da97e786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22750-vulnerability-in-vmware-spring-clou-95534ffc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22750%3A%20Vulnerability%20in%20VMware%20Spring%20Cloud%20Gateway&amp;severity=high&amp;id=69d8c0ed1cc7ad14daa35358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6033-sql-injection-in-codeastro-online-cl-ffdda805</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6033%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6032-cross-site-scripting-in-code-project-382797a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6032%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d8a85b1cc7ad14da97ec05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6031-sql-injection-in-code-projects-simpl-075bdf26</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6031%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d8a85b1cc7ad14da97ebfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6030-sql-injection-in-itsourcecode-constr-ef9de984</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6030%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d8a14c1cc7ad14da9459ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/obfuscated-javascript-or-nothing-thu-apr-9th-bb996e09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Obfuscated%20JavaScript%20or%20Nothing%2C%20(Thu%2C%20Apr%209th)&amp;severity=medium&amp;id=69d89dc71cc7ad14da930bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6029-os-command-injection-in-totolink-a71-25809d7e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6029%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8a14c1cc7ad14da9459e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1115-cwe-79-improper-neutralization-of-in-d36d67ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1115%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parisneo%20parisneo%2Flollms&amp;severity=critical&amp;id=69d8a14c1cc7ad14da9459dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6028-os-command-injection-in-totolink-a71-9a88a334</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6028%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8a14c1cc7ad14da9459e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6027-os-command-injection-in-totolink-a71-31aeb5d4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6027%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d896c01cc7ad14da90814c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4432-cwe-862-missing-authorization-in-yit-643fc10d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4432%3A%20CWE-862%20Missing%20Authorization%20in%20YITH%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=69d896c01cc7ad14da908142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14545-cwe-94-improper-control-of-generati-3ff76783</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14545%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20YML%20for%20Yandex%20Market&amp;severity=medium&amp;id=69d896c01cc7ad14da90813a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28704-uncontrolled-search-path-element-in-0070be31</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28704%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Japan%20Computer%20Emergency%20Response%20Team%20Coordination%20Center%20(JPCERT%2FCC)%20Emocheck&amp;severity=high&amp;id=69d896c01cc7ad14da90813d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6026-os-command-injection-in-totolink-a71-a189cd98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6026%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d896c01cc7ad14da908145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6025-os-command-injection-in-totolink-a71-da9e8d99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6025%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8c0ef1cc7ad14daa353ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6024-path-traversal-in-tenda-i6-dd97391a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6024%3A%20Path%20Traversal%20in%20Tenda%20i6&amp;severity=medium&amp;id=69d8c0ef1cc7ad14daa353c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6016-stack-based-buffer-overflow-in-tenda-87108250</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6016%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=69d8c0ed1cc7ad14daa35382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6015-stack-based-buffer-overflow-in-tenda-303df20e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6015%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=69d8c0ed1cc7ad14daa3537b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6014-buffer-overflow-in-d-link-dir-513-d6993d66</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6014%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69d881ab1cc7ad14da707af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4482-cwe-732-incorrect-permission-assignm-bd880abd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4482%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Rapid7%20Insight%20Agent&amp;severity=medium&amp;id=69d881ab1cc7ad14da707add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6013-buffer-overflow-in-d-link-dir-513-6c13a0cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6013%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69d881ab1cc7ad14da707af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6012-buffer-overflow-in-d-link-dir-513-ac2f7246</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6012%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69d881ab1cc7ad14da707ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6011-server-side-request-forgery-in-openc-b423bc79</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6011%3A%20Server-Side%20Request%20Forgery%20in%20OpenClaw&amp;severity=medium&amp;id=69d881ab1cc7ad14da707ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2305-cwe-79-improper-neutralization-of-in-ec8c241e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2305%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20addfunc%20AddFunc%20Head%20%26%20Footer%20Code&amp;severity=medium&amp;id=69d873981cc7ad14da5fb241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6010-sql-injection-in-codeastro-online-cl-d106f93e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6010%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d873981cc7ad14da5fb260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6007-sql-injection-in-itsourcecode-constr-62b9a200</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6007%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d873981cc7ad14da5fb259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6006-sql-injection-in-code-projects-patie-2a1a603c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6006%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=69d873981cc7ad14da5fb252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6005-sql-injection-in-code-projects-patie-08e27ebc</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6005%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=69d873981cc7ad14da5fb24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6004-sql-injection-in-code-projects-simpl-b10f2cc5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6004%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d862041cc7ad14da50d951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6003-cross-site-scripting-in-code-project-cdc25457</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6003%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d862041cc7ad14da50d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6000-information-disclosure-in-code-proje-37b28a8f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6000%3A%20Information%20Disclosure%20in%20code-projects%20Online%20Library%20Management%20System&amp;severity=medium&amp;id=69d862041cc7ad14da50d943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5999-improper-authorization-in-jeecgboot-8621e765</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5999%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=69d862041cc7ad14da50d93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5998-path-traversal-in-zhayujie-chatgpt-o-0d97bf7f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5998%3A%20Path%20Traversal%20in%20zhayujie%20chatgpt-on-wechat%20CowAgent&amp;severity=medium&amp;id=69d8577b1cc7ad14da4a0e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4305-cwe-79-improper-neutralization-of-in-420b397d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4305%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20WordPress%20Backup%2C%20Restore%20%26%20Migration%20Plugin%20%E2%80%93%20Backup%20WordPress%20Sites%20Safely&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4977-cwe-862-missing-authorization-in-sti-a4ee5ded</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4977%3A%20CWE-862%20Missing%20Authorization%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1924-cwe-352-cross-site-request-forgery-c-822f5202</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1924%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20arubadev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1263-cwe-79-improper-neutralization-of-in-11b0b0dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20usystemsgmbh%20Webling&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4057-cwe-862-missing-authorization-in-cod-ad9364fd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4057%3A%20CWE-862%20Missing%20Authorization%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3360-cwe-862-missing-authorization-in-the-e76eed5e</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3360%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=69d857791cc7ad14da4a0d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2712-cwe-863-incorrect-authorization-in-d-fc686a53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2712%3A%20CWE-863%20Incorrect%20Authorization%20in%20davidanderson%20WP-Optimize%20%E2%80%93%20Cache%2C%20Compress%20images%2C%20Minify%20%26%20Clean%20database%20to%20boost%20page%20speed%20%26%20performance&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4664-cwe-287-improper-authentication-in-i-4055877c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4664%3A%20CWE-287%20Improper%20Authentication%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25203-cwe-276-incorrect-default-permissio-03753a3c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25203%3A%20CWE-276%20Incorrect%20default%20permissions%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=69d857791cc7ad14da4a0d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5997-os-command-injection-in-totolink-a71-76c83173</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5997%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8577b1cc7ad14da4a0e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5996-os-command-injection-in-totolink-a71-7853c72c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5996%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d857791cc7ad14da4a0d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5995-os-command-injection-in-totolink-a71-27cc3191</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5995%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d84cee1cc7ad14da453a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5994-os-command-injection-in-totolink-a71-2d1c7675</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5994%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d84cee1cc7ad14da453a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5993-os-command-injection-in-totolink-a71-a914265d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5993%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d84cee1cc7ad14da453a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5992-stack-based-buffer-overflow-in-tenda-c07121b3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5992%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d843721cc7ad14da3fb3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-11-2d3e7714</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-11&amp;severity=medium&amp;id=69da49bb82d89c981fbccd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/d-link-dir-650in-authenticated-command-injection-dcfa2848</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=D-Link%20DIR-650IN%20-%20Authenticated%20Command%20Injection&amp;severity=medium&amp;id=69da14bc1cc7ad14da6c87c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/netbt-e-fatura-privilege-escalation-2d29044b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NetBT%20e-Fatura%20-%20Privilege%20Escalation&amp;severity=high&amp;id=69da14bc1cc7ad14da6c87be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36235-na-0ae03a2e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36235%3A%20n%2Fa&amp;severity=critical&amp;id=69d9d97c1cc7ad14da3f88cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36234-na-a5ba7054</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36234%3A%20n%2Fa&amp;severity=critical&amp;id=69d9d97c1cc7ad14da3f88c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23782-na-0fdc13b3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23782%3A%20n%2Fa&amp;severity=high&amp;id=69d9d97c1cc7ad14da3f88c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23780-na-ab7a798d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23780%3A%20n%2Fa&amp;severity=high&amp;id=69d9d97c1cc7ad14da3f88c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-10-1d7bbbf2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-10&amp;severity=medium&amp;id=69d990531cc7ad14dafc4172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40200-cwe-670-always-incorrect-control-fl-f042e7c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40200%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20musl-libc%20musl&amp;severity=high&amp;id=69d934f31cc7ad14dad772cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23781-na-c225d0b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23781%3A%20n%2Fa&amp;severity=critical&amp;id=69d91fde1cc7ad14dacba26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36236-na-44ed902d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36236%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36233-na-5f0d3ffa</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36233%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36232-na-0e8be59d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36232%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31262-na-06fac518</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31262%3A%20n%2Fa&amp;severity=medium&amp;id=69d911cc1cc7ad14dac5d987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29861-na-674eb41c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29861%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44560-na-078fe07f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44560%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40212-cwe-79-improper-neutralization-of-i-3208d4c2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenStack%20Skyline&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa3535c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-10-b8cac7f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-10&amp;severity=low&amp;id=69d89dbf1cc7ad14da92fe8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33551-cwe-863-incorrect-authorization-in--d9f794f9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33551%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenStack%20Keystone&amp;severity=low&amp;id=69d862041cc7ad14da50d937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5991-stack-based-buffer-overflow-in-tenda-d9d7beab</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5991%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d83edb1cc7ad14da371612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5990-stack-based-buffer-overflow-in-tenda-d9b58ad7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5990%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d83b611cc7ad14da35ec14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5989-stack-based-buffer-overflow-in-tenda-4ab9255d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5989%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d837d41cc7ad14da341bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5988-stack-based-buffer-overflow-in-tenda-f0bea76b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5988%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d830cb1cc7ad14da313a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34424-cwe-506-embedded-malicious-code-in--565778ad</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34424%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20Nextendweb%20Smart%20Slider%203%20Pro%20for%20WordPress&amp;severity=critical&amp;id=69d830cb1cc7ad14da313a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5987-improper-neutralization-of-special-e-dbbbc8a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5987%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69d830cb1cc7ad14da313a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5986-inefficient-regular-expression-compl-786c5a63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5986%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Zod%20jsVideoUrlParser&amp;severity=medium&amp;id=69d82d481cc7ad14da2fc1d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5985-sql-injection-in-code-projects-simpl-7a020e0b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5985%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d829c91cc7ad14da2ebbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5984-buffer-overflow-in-d-link-dir-605l-1e0e7e69</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5984%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d826401cc7ad14da2cd53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5983-buffer-overflow-in-d-link-dir-605l-7db7f7d5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5983%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d822bf1cc7ad14da2ad179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39848-cwe-306-missing-authentication-for--f97002da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39848%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%2010ij%20dockyard&amp;severity=medium&amp;id=69d822bf1cc7ad14da2ad173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40154-cwe-829-inclusion-of-functionality--9f489fbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40154%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d822bf1cc7ad14da2ad176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33791-cwe-78-improper-neutralization-of-s-fe83384c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33791%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bf1cc7ad14da2ad16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33790-cwe-754-improper-check-for-unusual--85692ec6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33790%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bf1cc7ad14da2ad16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33787-cwe-754-improper-check-for-unusual--694a92be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33787%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33785-cwe-862-missing-authorization-in-ju-907520bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33785%3A%20CWE-862%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33784-cwe-1393-use-of-default-password-in-a5f42388</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33784%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20Juniper%20Networks%20JSI%20LWC&amp;severity=critical&amp;id=69d822bd1cc7ad14da2ac974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33783-cwe-686-function-call-with-incorrec-e831da69</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33783%3A%20CWE-686%20Function%20Call%20With%20Incorrect%20Argument%20Type%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33781-cwe-754-improper-check-for-unusual--5da4c39e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33781%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33778-cwe-1286-improper-validation-of-syn-7e44dea9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33778%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33776-cwe-862-missing-authorization-in-ju-76a39714</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33776%3A%20CWE-862%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33774-cwe-754-improper-check-for-unusual--42120f1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33774%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33771-cwe-521-weak-password-requirements--2b26f331</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33771%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Juniper%20Networks%20CTP%20OS&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13914-cwe-322-key-exchange-without-entity-37c05f82</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13914%3A%20CWE-322%20Key%20Exchange%20without%20Entity%20Authentication%20in%20Juniper%20Networks%20Apstra&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33797-cwe-20-improper-input-validation-in-032bb2fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33797%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bf1cc7ad14da2ad170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33779-cwe-296-improper-following-of-a-cer-0b4d9e12</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33779%3A%20CWE-296%20Improper%20Following%20of%20a%20Certificate&apos;s%20Chain%20of%20Trust%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5982-buffer-overflow-in-d-link-dir-605l-29438337</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5982%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d843771cc7ad14da3fb5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33775-cwe-401-missing-release-of-memory-a-f0fccbf5</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33775%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40151-cwe-200-exposure-of-sensitive-infor-41548a8f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40151%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33782-cwe-401-missing-release-of-memory-a-e886ea1e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33782%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843751cc7ad14da3fb550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33780-cwe-401-missing-release-of-memory-a-b58b1c8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33780%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33773-cwe-1419-incorrect-initialization-o-03dd345c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33773%3A%20CWE-1419%20Incorrect%20Initialization%20of%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33786-cwe-754-improper-check-for-unusual--ee330a5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33786%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843751cc7ad14da3fb553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21916-cwe-61-unix-symbolic-link-symlink-f-d17287ef</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21916%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d843721cc7ad14da3fb3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40153-cwe-526-cleartext-storage-of-sensit-f8d2a9e5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40153%3A%20CWE-526%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20MervinPraison%20PraisonAIAgents&amp;severity=high&amp;id=69d843771cc7ad14da3fb5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33788-cwe-306-missing-authentication-for--9816a849</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33788%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=high&amp;id=69d843751cc7ad14da3fb556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40152-cwe-22-improper-limitation-of-a-pat-c32af342</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40152%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21919-cwe-821-incorrect-synchronization-i-6dad3dbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21919%3A%20CWE-821%20Incorrect%20Synchronization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21915-cwe-183-permissive-list-of-allowed--507f4fbe</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21915%3A%20CWE-183%20Permissive%20List%20of%20Allowed%20Input%20in%20Juniper%20Networks%20JSI%20LWC&amp;severity=medium&amp;id=69d843721cc7ad14da3fb3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21904-cwe-79-improper-neutralization-of-i-dd40f02e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=69d843721cc7ad14da3fb3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40150-cwe-918-server-side-request-forgery-f4493f40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40150%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=high&amp;id=69d843771cc7ad14da3fb5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59969-cwe-120-buffer-copy-without-checkin-b5ea3861</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59969%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=69d843721cc7ad14da3fb3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33793-cwe-250-execution-with-unnecessary--3bbff8ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33793%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d843751cc7ad14da3fb559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40149-cwe-396-declaration-of-catch-for-ge-02f2486d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40149%3A%20CWE-396%3A%20Declaration%20of%20Catch%20for%20Generic%20Exception%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843771cc7ad14da3fb5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40148-cwe-409-improper-handling-of-highly-d3e405c0</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40148%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40117-cwe-862-missing-authorization-in-me-70fd32bd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40117%3A%20CWE-862%3A%20Missing%20Authorization%20in%20MervinPraison%20PraisonAIAgents&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40116-cwe-770-allocation-of-resources-wit-314adf4e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40116%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843751cc7ad14da3fb56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40115-cwe-770-allocation-of-resources-wit-b5c41bbe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40115%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843751cc7ad14da3fb568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40114-cwe-918-server-side-request-forgery-7451409a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40114%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843751cc7ad14da3fb565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40113-cwe-88-improper-neutralization-of-a-5a799066</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40113%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843751cc7ad14da3fb562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40112-cwe-79-improper-neutralization-of-i-bf712808</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40112%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843751cc7ad14da3fb55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5981-buffer-overflow-in-d-link-dir-605l-6fa03a4c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5981%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d843771cc7ad14da3fb5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40111-cwe-78-improper-neutralization-of-s-03ac2b4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40111%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=critical&amp;id=69d843751cc7ad14da3fb55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40109-cwe-287-improper-authentication-in--838f1a64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40109%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fluxcd%20notification-controller&amp;severity=low&amp;id=69d818301cc7ad14da2455d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40107-cwe-918-server-side-request-forgery-d79e17bb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40107%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69d818301cc7ad14da2455d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5980-buffer-overflow-in-d-link-dir-605l-e4664738</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5980%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d818301cc7ad14da2455de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5979-buffer-overflow-in-d-link-dir-605l-b22fd00b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5979%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d814ae1cc7ad14da21653e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5978-os-command-injection-in-totolink-a71-67e7851c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5978%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d814ae1cc7ad14da216536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40093-cwe-1284-improper-validation-of-spe-f1fcce45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40093%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69d814ae1cc7ad14da21652c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/payroll-pirate-attacks-targeting-canadian-employee-53033fb6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Payroll%20pirate%20attacks%20targeting%20Canadian%20employees&amp;severity=medium&amp;id=69d8ceff1cc7ad14daa91506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5977-os-command-injection-in-totolink-a71-090c4d25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5977%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d814ae1cc7ad14da21652f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4436-cwe-306-in-gpl-odorizers-gpl750-xl4-dbe0f47c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4436%3A%20CWE-306%20in%20GPL%20Odorizers%20GPL750%20(XL4)&amp;severity=high&amp;id=69d80a201cc7ad14da1a948e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5976-os-command-injection-in-totolink-a71-3f6a2565</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5976%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d80a201cc7ad14da1a9493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13926-cwe-807-in-contemporary-controls-ba-6c5309fd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13926%3A%20CWE-807%20in%20Contemporary%20Controls%20BASControl20&amp;severity=critical&amp;id=69d806d21cc7ad14da15a557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5975-os-command-injection-in-totolink-a71-9db2234a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5975%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d806d51cc7ad14da15a662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40088-cwe-78-improper-neutralization-of-s-245484f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40088%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d806d21cc7ad14da15a576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40089-cwe-918-server-side-request-forgery-35713674</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40089%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sonicverse-eu%20audiostreaming-stack&amp;severity=critical&amp;id=69d806d21cc7ad14da15a57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35577-cwe-346-origin-validation-error-in--8745ce80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35577%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20apollographql%20apollo-mcp-server&amp;severity=medium&amp;id=69d806d21cc7ad14da15a568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34500-clientcert-authentication-does-not--63ca00a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34500%3A%20CLIENT_CERT%20authentication%20does%20not%20fail%20as%20expected%20for%20some%20scenarios%20when%20soft%20fail%20is%20disabled%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=69d806d21cc7ad14da15a565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34487-cwe-532-insertion-of-sensitive-info-07344d29</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34487%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d806d21cc7ad14da15a562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34486-cwe-311-missing-encryption-of-sensi-1ab7897d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34486%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d806d21cc7ad14da15a55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40087-cwe-1336-improper-neutralization-of-fca192b1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40087%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20langchain-ai%20langchain&amp;severity=medium&amp;id=69d806d21cc7ad14da15a56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34483-cwe-116-improper-encoding-or-escapi-c352f5d2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34483%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d806d21cc7ad14da15a55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5974-os-command-injection-in-foundationag-8a1cc3ed</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5974%3A%20OS%20Command%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d806d21cc7ad14da15a57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40077-cwe-184-incomplete-list-of-disallow-9c7f4ad8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40077%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20henrygd%20beszel&amp;severity=low&amp;id=69d7ff941cc7ad14da10e9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32990-cwe-20-improper-input-validation-in-0341ee1d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32990%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=69d7ff941cc7ad14da10e9d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29146-padding-oracle-in-apache-software-f-295d2dfe</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29146%3A%20Padding%20Oracle%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29145-clientcert-authentication-does-not--11e42669</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29145%3A%20CLIENT_CERT%20authentication%20does%20not%20fail%20as%20expected%20for%20some%20scenarios%20when%20soft%20fail%20is%20disabled%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=69d7ff941cc7ad14da10e9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29129-configured-cipher-preference-order--0d71e2cd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29129%3A%20Configured%20cipher%20preference%20order%20not%20preserved%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5973-os-command-injection-in-foundationag-59f6508b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5973%3A%20OS%20Command%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ff961cc7ad14da10ea47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25854-cwe-601-url-redirection-to-untruste-d400d1c0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25854%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=69d7ff941cc7ad14da10e9c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24880-cwe-444-inconsistent-interpretation-eda0d8cc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24880%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39977-cwe-22-improper-limitation-of-a-pat-bed6ef14</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39977%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flatpak%20flatpak-builder&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34734-cwe-416-use-after-free-in-hdfgroup--d00b0ad3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34734%3A%20CWE-416%3A%20Use%20After%20Free%20in%20HDFGroup%20hdf5&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5972-os-command-injection-in-foundationag-a112b45e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5972%3A%20OS%20Command%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ff961cc7ad14da10ea3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35195-cwe-787-out-of-bounds-write-in-byte-0b549b4f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35195%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88e1cc7ad14da0c179f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35186-cwe-789-memory-allocation-with-exce-60d4a794</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35186%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c170c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34988-cwe-119-improper-restriction-of-ope-738809df</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34988%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=69d7f88c1cc7ad14da0c1709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34987-cwe-125-out-of-bounds-read-in-bytec-5d6922fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34987%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=critical&amp;id=69d7f88c1cc7ad14da0c1706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34983-cwe-416-use-after-free-in-bytecodea-5453e933</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34983%3A%20CWE-416%3A%20Use%20After%20Free%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=69d7f88c1cc7ad14da0c1703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34971-cwe-125-out-of-bounds-read-in-bytec-510a8be8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34971%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=critical&amp;id=69d7f88c1cc7ad14da0c1700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34946-cwe-670-always-incorrect-control-fl-797568c7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34946%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c16fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34945-cwe-681-incorrect-conversion-betwee-93e30ae8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34945%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=69d7f88c1cc7ad14da0c16fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34944-cwe-248-uncaught-exception-in-bytec-19057013</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34944%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c16f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34943-cwe-248-uncaught-exception-in-bytec-2b6ea09e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34943%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c16f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34942-cwe-129-improper-validation-of-arra-8b6d6f53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34942%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d806d51cc7ad14da15a669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34941-cwe-125-out-of-bounds-read-in-bytec-44d942e6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34941%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d843791cc7ad14da3fb68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealer-campaign-impacting-sltt-macos-users-463cbc4e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealer%20Campaign%20Impacting%20SLTT%20macOS%20Users&amp;severity=medium&amp;id=69d7f1821cc7ad14da06f834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1584-null-pointer-dereference-in-red-hat--56fa43b6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1584%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=high&amp;id=69d7ee091cc7ad14da04a8bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5971-improper-neutralization-of-directive-5770f87f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5971%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39911-cwe-668-exposure-of-resource-to-wro-9576e92f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39911%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20hashgraph%20guardian&amp;severity=high&amp;id=69d7ee091cc7ad14da04a8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39315-cwe-184-incomplete-list-of-disallow-a8a63c9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39315%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20unjs%20unhead&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5329-cwe-20-improper-input-validation-in--bf8aa5a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5329%3A%20CWE-20%20Improper%20input%20validation%20in%20Rapid7%20Velociraptor&amp;severity=high&amp;id=69d7ee091cc7ad14da04a8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35207-cwe-295-improper-certificate-valida-e017082c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35207%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20linuxdeepin%20dde-control-center&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-fake-windows-support-website-delivers-passwor-edce3a29</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20fake%20Windows%20support%20website%20delivers%20password-stealing%20malware&amp;severity=medium&amp;id=69d7e6f61cc7ad14dafe7e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40072-cwe-918-server-side-request-forgery-61669d9c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40072%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ethereum%20web3.py&amp;severity=low&amp;id=69d7e6ff1cc7ad14dafe8de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40070-cwe-347-improper-verification-of-cr-caaefd13</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40070%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20sgbett%20bsv-ruby-sdk&amp;severity=high&amp;id=69d7e6ff1cc7ad14dafe8de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40069-cwe-754-improper-check-for-unusual--107e7303</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40069%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20sgbett%20bsv-ruby-sdk&amp;severity=high&amp;id=69d7e6ff1cc7ad14dafe8dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39987-cwe-306-missing-authentication-for--7b043647</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39987%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20marimo-team%20marimo&amp;severity=critical&amp;id=69d7e6ff1cc7ad14dafe8dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39961-cwe-269-improper-privilege-manageme-9281336f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39961%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20aiven%20aiven-operator&amp;severity=medium&amp;id=69d843791cc7ad14da3fb693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39985-cwe-601-url-redirection-to-untruste-53c41450</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39985%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20aces%20Loris&amp;severity=medium&amp;id=69d843791cc7ad14da3fb69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39983-cwe-93-improper-neutralization-of-c-5c3326f7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39983%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20patrickjuchli%20basic-ftp&amp;severity=high&amp;id=69d806d51cc7ad14da15a66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39981-cwe-22-improper-limitation-of-a-pat-3d5cb72d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39981%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Josh-XT%20AGiXT&amp;severity=high&amp;id=69d843791cc7ad14da3fb698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5970-code-injection-in-foundationagents-m-8f8c046d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5970%3A%20Code%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39980-cwe-1336-improper-neutralization-of-06ee5ee4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39980%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20OpenCTI-Platform%20opencti&amp;severity=critical&amp;id=69d7f88e1cc7ad14da0c17a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39976-cwe-287-improper-authentication-in--ed402c61</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39976%3A%20CWE-287%3A%20Improper%20Authentication%20in%20laravel%20passport&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39974-cwe-918-server-side-request-forgery-b8153f8d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39974%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20czlonkowski%20n8n-mcp&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39972-cwe-1289-improper-validation-of-uns-b2f4daad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39972%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20dunglas%20mercure&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5962-path-traversal-in-tenda-ch22-8c2770fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5962%3A%20Path%20Traversal%20in%20Tenda%20CH22&amp;severity=medium&amp;id=69d7dc7c1cc7ad14daf451e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39959-cwe-770-allocation-of-resources-wit-3b1278fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39959%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20tmds%20Tmds.DBus&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39958-cwe-93-improper-neutralization-of-c-87cdf680</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39958%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20AOSC-Dev%20oma&amp;severity=medium&amp;id=69d7dc7c1cc7ad14daf451cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5961-sql-injection-in-code-projects-simpl-212dd00d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5961%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39957-cwe-863-incorrect-authorization-in--e2f07009</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39957%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=69d7d5661cc7ad14daeeafbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39856-cwe-125-out-of-bounds-read-in-mtroj-7ec6c2c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39856%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20mtrojnar%20osslsigncode&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39855-cwe-125-out-of-bounds-read-in-mtroj-d24019ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39855%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20mtrojnar%20osslsigncode&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40046-cwe-190-integer-overflow-or-wraparo-44ec5833</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40046%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=high&amp;id=69d7d5661cc7ad14daeeafc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33005-cwe-274-improper-handling-of-insuff-ac9e3c46</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33005%3A%20CWE-274%20Improper%20Handling%20of%20Insufficient%20Privileges%20in%20Apache%20Software%20Foundation%20Apache%20OpenMeetings&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33266-cwe-321-use-of-hard-coded-cryptogra-2ef088ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33266%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Apache%20Software%20Foundation%20Apache%20OpenMeetings&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34020-cwe-598-use-of-get-request-method-w-60f3b614</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34020%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Apache%20Software%20Foundation%20Apache%20OpenMeetings&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39853-cwe-121-stack-based-buffer-overflow-b0fc9cb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39853%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20mtrojnar%20osslsigncode&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39843-cwe-918-server-side-request-forgery-320d8b73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39843%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20makeplane%20plane&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39941-cwe-79-improper-neutralization-of-i-7e221f3f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39941%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5960-information-disclosure-in-code-proje-0cffe94e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5960%3A%20Information%20Disclosure%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=69d843791cc7ad14da3fb6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14551-cwe-1258-exposure-of-sensitive-syst-9638ed34</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14551%3A%20CWE-1258%20Exposure%20of%20sensitive%20system%20information%20due%20to%20uncleared%20debug%20information%20in%20Canonical%20Ubuntu&amp;severity=low&amp;id=69d843791cc7ad14da3fb6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15480-cwe-1258-exposure-of-sensitive-syst-91250a7b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15480%3A%20CWE-1258%20Exposure%20of%20sensitive%20system%20information%20due%20to%20uncleared%20debug%20information%20in%20Canonical%20Ubuntu&amp;severity=low&amp;id=69d843791cc7ad14da3fb6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35041-cwe-1333-inefficient-regular-expres-03a72d0b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35041%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20nearform%20fast-jwt&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35040-cwe-697-incorrect-comparison-in-nea-15fbf83e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35040%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20nearform%20fast-jwt&amp;severity=medium&amp;id=69d843791cc7ad14da3fb6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4878-time-of-check-time-of-use-toctou-rac-180716e1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4878%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f92c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5439-cwe-770-allocation-of-resources-with-074c2bff</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5439%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5437-cwe-125-out-of-bounds-read-in-orthan-293b06ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5437%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5438-cwe-770-allocation-of-resources-with-79ed6dbd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5438%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5440-cwe-770-allocation-of-resources-with-06df998f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5440%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5442-cwe-190-integer-overflow-or-wraparou-82cdd837</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5442%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Orthanc%20DICOM%20Server&amp;severity=critical&amp;id=69d7bcce1cc7ad14dad7b6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5443-cwe-190-integer-overflow-or-wraparou-81ca17a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5443%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Orthanc%20DICOM%20Server&amp;severity=critical&amp;id=69d7bcce1cc7ad14dad7b6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5445-cwe-125-out-of-bounds-read-in-orthan-76abb402</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5445%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Orthanc%20DICOM%20Server&amp;severity=critical&amp;id=69d7bcce1cc7ad14dad7b704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5444-cwe-190-integer-overflow-or-wraparou-9c148454</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5444%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5441-cwe-125-out-of-bounds-read-in-orthan-a48040f3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5441%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34757-cwe-416-use-after-free-in-pnggroup--e7c61505</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34757%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69d7bccb1cc7ad14dad7b12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34578-cwe-90-improper-neutralization-of-s-17b84668</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34578%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20opnsense%20core&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5959-improper-authentication-in-glinet-gl-10bc5666</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5959%3A%20Improper%20Authentication%20in%20GL.iNet%20GL-RM1&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4116-cwe-176-improper-handling-of-unicode-8fb56da1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4116%3A%20CWE-176%20Improper%20handling%20of%20unicode%20encoding%20in%20SonicWall%20SMA1000&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4114-cwe-176-improper-handling-of-unicode-d58b930d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4114%3A%20CWE-176%20Improper%20handling%20of%20unicode%20encoding%20in%20SonicWall%20SMA1000&amp;severity=null&amp;id=69d7bccb1cc7ad14dad7b137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4113-cwe-204-observable-response-discrepa-f4d701a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4113%3A%20CWE-204%20Observable%20response%20discrepancy%20in%20SonicWall%20SMA1000&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4112-cwe-89-improper-neutralization-of-sp-b9df2c98</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4112%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20SonicWall%20SMA1000&amp;severity=null&amp;id=69d7bccb1cc7ad14dad7b131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4660-cwe-200-exposure-of-sensitive-inform-dbd7d623</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4660%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HashiCorp%20Tooling&amp;severity=high&amp;id=69d7b5c31cc7ad14dad0f199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-intelligence-ai-guardrails-bypassed-in-new-a-79953f19</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Intelligence%20AI%20Guardrails%20Bypassed%20in%20New%20Attack&amp;severity=medium&amp;id=69d7aeb91cc7ad14dac9d0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/can-we-trust-ai-no-but-eventually-we-must-e2dcb60f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can%20We%20Trust%20AI%3F%20No%20%E2%80%93%20But%20Eventually%20We%20Must&amp;severity=medium&amp;id=69d7ab341cc7ad14dac63dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2519-cwe-472-external-control-of-assumed--f77b1e5e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2519%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20ladela%20Online%20Scheduling%20and%20Appointment%20Booking%20System%20%E2%80%93%20Bookly&amp;severity=medium&amp;id=69d8437c1cc7ad14da3fb791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3005-cwe-79-improper-neutralization-of-in-f4313294</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3005%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fernandobt%20List%20category%20posts&amp;severity=medium&amp;id=69d7e6ff1cc7ad14dafe8df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-api-keys-in-android-apps-expose-gemini-endp-14a569b2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20API%20Keys%20in%20Android%20Apps%20Expose%20Gemini%20Endpoints%20to%20Unauthorized%20Access&amp;severity=medium&amp;id=69d79d241cc7ad14daba7bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/palo-alto-networks-sonicwall-patch-high-severity-v-2ff5737b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Palo%20Alto%20Networks%2C%20SonicWall%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69d7961c1cc7ad14dab19540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57735-cwe-613-insufficient-session-expira-9dc4a2f3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57735%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=critical&amp;id=69d78b8f1cc7ad14daa6c55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-hidden-roi-of-visibility-better-decisions-bett-17805858</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Hidden%20ROI%20of%20Visibility%3A%20Better%20Decisions%2C%20Better%20Behavior%2C%20Better%20Security&amp;severity=medium&amp;id=69d788131cc7ad14daa31486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1490-cwe-94-improper-control-of-generatio-5517fc7b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1490%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WAGO%20CC100%20(0751-9x01)&amp;severity=high&amp;id=69d78b8f1cc7ad14daa6c55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-bts-arirang-tour-tickets-k-pop-fans-being-tar-0be0f8a4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20BTS%20ARIRANG%20tour%20tickets%3A%20K-pop%20fans%20being%20targeted%20by%20scammers%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d843531cc7ad14da3f941e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-long-road-to-your-crypto-clipbanker-and-its-ma-4b0c512e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20long%20road%20to%20your%20crypto%3A%20ClipBanker%20and%20its%20marathon%20infection%20chain&amp;severity=medium&amp;id=69d7edfe1cc7ad14da04a129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-warns-of-new-campaign-targeting-bpos-to-ste-2ae94a62</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Warns%20of%20New%20Campaign%20Targeting%20BPOs%20to%20Steal%20Corporate%20Data&amp;severity=medium&amp;id=69d776771cc7ad14da90de65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34185-cwe-89-improper-neutralization-of-s-b24b909e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34185%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Hydrosystem%20Control%20System&amp;severity=high&amp;id=69d779fb1cc7ad14da954be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34184-cwe-862-missing-authorization-in-hy-99f5b924</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34184%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Hydrosystem%20Control%20System&amp;severity=high&amp;id=69d779fb1cc7ad14da954bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4901-cwe-532-insertion-of-sensitive-infor-8b7a094e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4901%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hydrosystem%20Control%20System&amp;severity=medium&amp;id=69d779fb1cc7ad14da954be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62188-cwe-200-exposure-of-sensitive-infor-99fa2049</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62188%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=high&amp;id=69d779fb1cc7ad14da954bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34179-cwe-915-improperly-controlled-modif-752fa0b8</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34179%3A%20CWE-915%20Improperly%20controlled%20modification%20of%20Dynamically-Determined%20object%20attributes%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69d773081cc7ad14da8bdc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34178-cwe-20-improper-input-validation-in-47a9832a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34178%3A%20CWE-20%20Improper%20input%20validation%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69d773081cc7ad14da8bdc1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34177-cwe-184-incomplete-list-of-disallow-fcea39f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34177%3A%20CWE-184%20Incomplete%20list%20of%20disallowed%20inputs%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69d773081cc7ad14da8bdc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34538-cwe-668-exposure-of-resource-to-wro-0014a9aa</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34538%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69d773081cc7ad14da8bdc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-reader-zero-day-exploited-for-months-researc-bb17e8d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Reader%20Zero-Day%20Exploited%20for%20Months%3A%20Researcher&amp;severity=medium&amp;id=69d768671cc7ad14da81cf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/300000-people-impacted-by-eurail-data-breach-a952810e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=300%2C000%20People%20Impacted%20by%20Eurail%20Data%20Breach&amp;severity=medium&amp;id=69d764e31cc7ad14da7ab3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5854-os-command-injection-in-totolink-a71-6aac9f98</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5854%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d7ab3c1cc7ad14dac63fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/36-million-stolen-in-bitcoin-depot-hack-9a950dd5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%243.6%20Million%20Stolen%20in%20Bitcoin%20Depot%20Hack&amp;severity=medium&amp;id=69d74c471cc7ad14da5c17cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5853-os-command-injection-in-totolink-a71-2b9f2bf4</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5853%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d843791cc7ad14da3fb6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5852-os-command-injection-in-totolink-a71-675e6a7d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5852%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d7d5661cc7ad14daeeafd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5851-os-command-injection-in-totolink-a71-cec71662</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5851%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d745461cc7ad14da533b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5850-os-command-injection-in-totolink-a71-c437d074</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5850%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d745461cc7ad14da533b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5849-path-traversal-in-tenda-i12-633437ed</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5849%3A%20Path%20Traversal%20in%20Tenda%20i12&amp;severity=medium&amp;id=69d73e371cc7ad14da48c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5848-code-injection-in-jeecgboot-jimurepo-5ed759a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5848%3A%20Code%20Injection%20in%20jeecgboot%20JimuReport&amp;severity=medium&amp;id=69d73e371cc7ad14da48c735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5847-information-disclosure-in-code-proje-2971db23</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5847%3A%20Information%20Disclosure%20in%20code-projects%20Movie%20Ticketing%20System&amp;severity=medium&amp;id=69d733ab1cc7ad14da3bfe82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5844-os-command-injection-in-d-link-dir-8-643de94e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5844%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-882&amp;severity=high&amp;id=69d733ab1cc7ad14da3bfe7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5842-authorization-bypass-in-decolua-9rou-1a856ee8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5842%3A%20Authorization%20Bypass%20in%20decolua%209router&amp;severity=medium&amp;id=69d733ab1cc7ad14da3bfe71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5841-path-traversal-in-tenda-i3-164f6532</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5841%3A%20Path%20Traversal%20in%20Tenda%20i3&amp;severity=medium&amp;id=69d733ab1cc7ad14da3bfe6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5840-sql-injection-in-phpgurukul-news-por-954d6b68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5840%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d729211cc7ad14da1b3396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5839-sql-injection-in-phpgurukul-news-por-8075a883</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5839%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d729211cc7ad14da1b338f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5838-sql-injection-in-phpgurukul-news-por-cde1d916</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5838%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d729211cc7ad14da1b3388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5742-cwe-79-improper-neutralization-of-in-075f568f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5742%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=69d729211cc7ad14da1b337b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4336-cwe-79-improper-neutralization-of-in-a8fdf393</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4336%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Ultimate%20FAQ%20Accordion%20Plugin&amp;severity=medium&amp;id=69d729211cc7ad14da1b3371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1830-cwe-862-missing-authorization-in-dav-233f04bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1830%3A%20CWE-862%20Missing%20Authorization%20in%20davidfcarr%20Quick%20Playground&amp;severity=critical&amp;id=69d729211cc7ad14da1b336b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5837-sql-injection-in-phpgurukul-news-por-ed5b132e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5837%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5836-cross-site-scripting-in-code-project-5aecdbe0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5836%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5835-cross-site-scripting-in-code-project-c85ef674</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5835%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5834-cross-site-scripting-in-code-project-5de33a51</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5834%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3568-cwe-639-authorization-bypass-through-4f70d3ac</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3568%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3574-cwe-79-improper-neutralization-of-in-05424aae</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxdexperts%20Experto%20Dashboard%20for%20WooCommerce&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4429-cwe-79-improper-neutralization-of-in-1c6cee7c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photoweblog%20OSM%20%E2%80%93%20OpenStreetMap&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5357-cwe-79-improper-neutralization-of-in-e6dba13a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5357%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4124-cwe-862-missing-authorization-in-oli-51e7aa24</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4124%3A%20CWE-862%20Missing%20Authorization%20in%20oliverfriedmann%20Ziggeo&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5833-command-injection-in-awwaiid-mcp-ser-701bd158</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5833%3A%20Command%20Injection%20in%20awwaiid%20mcp-server-taskwarrior&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5832-server-side-request-forgery-in-atoto-14e72165</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5832%3A%20Server-Side%20Request%20Forgery%20in%20atototo%20api-lab-mcp&amp;severity=medium&amp;id=69d736f91cc7ad14da418a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-9th-2026-httpsisc-a0436d63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%209th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9886%2C%20(Thu%2C%20Apr%209th)&amp;severity=medium&amp;id=69d7097b1cc7ad14daf111f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5831-os-command-injection-in-agions-taskf-212bac83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5831%3A%20OS%20Command%20Injection%20in%20Agions%20taskflow-ai&amp;severity=medium&amp;id=69d736f91cc7ad14da418a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5830-stack-based-buffer-overflow-in-tenda-981c5f43</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5830%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=69d736f91cc7ad14da418a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4326-cwe-862-missing-authorization-in-web-dd66b007</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4326%3A%20CWE-862%20Missing%20Authorization%20in%20webilia%20Vertex%20Addons%20for%20Elementor&amp;severity=high&amp;id=69d736f91cc7ad14da418a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shaky-ceasefire-unlikely-to-stop-cyberattacks-from-6f18e0b3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shaky%20Ceasefire%20Unlikely%20to%20Stop%20Cyberattacks%20From%20Iran-Linked%20Hackers%20for%20Long&amp;severity=medium&amp;id=69d702731cc7ad14daeb9723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5829-sql-injection-in-code-projects-simpl-29fb31de</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5829%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d736f91cc7ad14da418a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5828-sql-injection-in-code-projects-simpl-1d307435</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5828%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d736f91cc7ad14da418a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/number-usage-in-passwords-take-two-thu-apr-9th-403df6ed</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Number%20Usage%20in%20Passwords%3A%20Take%20Two%2C%20(Thu%2C%20Apr%209th)&amp;severity=medium&amp;id=69d6fb701cc7ad14dae5c803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5827-sql-injection-in-code-projects-simpl-99d025b7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5827%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d6f7e71cc7ad14dadd0205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5826-cross-site-scripting-in-code-project-39d2de4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5826%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d6f7e71cc7ad14dadd01fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5825-cross-site-scripting-in-code-project-cbb32e8a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5825%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d6f7e71cc7ad14dadd01f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-10-8f59087b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-10&amp;severity=medium&amp;id=69d92a5f1cc7ad14dad12fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63238-na-9f8a7fac</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63238%3A%20n%2Fa&amp;severity=medium&amp;id=69d843791cc7ad14da3fb68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70797-na-541710b7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70797%3A%20n%2Fa&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zsh-59-rce-38823372</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZSH%205.9%20-%20RCE&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jumbo-website-manager-remote-code-execution-e1adfaac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jumbo%20Website%20Manager%20%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romm-440-xsscsrf-chain-26560fa6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RomM%20%204.4.0%20-%20%20XSS_CSRF%20Chain&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react-server-1920-remote-code-execution-a47c1524</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React%20Server%2019.2.0%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-09-529a6852</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-09&amp;severity=medium&amp;id=69d83ed21cc7ad14da370704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30478-na-6c9f2b00</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30478%3A%20n%2Fa&amp;severity=high&amp;id=69d814ae1cc7ad14da216545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29923-na-d93035f5</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29923%3A%20n%2Fa&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31170-na-b6e95fba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31170%3A%20n%2Fa&amp;severity=critical&amp;id=69d7f88c1cc7ad14da0c16f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30479-na-433cc714</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30479%3A%20n%2Fa&amp;severity=critical&amp;id=69d7d5661cc7ad14daeeafae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70365-na-eb904860</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70365%3A%20n%2Fa&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70364-na-586092fd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70364%3A%20n%2Fa&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70811-na-92c3ea46</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70811%3A%20n%2Fa&amp;severity=medium&amp;id=69d7bccb1cc7ad14dad7b121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70810-na-aca56658</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70810%3A%20n%2Fa&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50228-na-e450932f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50228%3A%20n%2Fa&amp;severity=critical&amp;id=69d7bccb1cc7ad14dad7b117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45806-na-0e08cff6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45806%3A%20n%2Fa&amp;severity=medium&amp;id=69d7b5c31cc7ad14dad0f194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-09-e95f5b79</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-09&amp;severity=low&amp;id=69d780fb1cc7ad14da9b687c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5824-sql-injection-in-code-projects-simpl-13fb8677</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5824%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d6ed861cc7ad14dac7072b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5823-sql-injection-in-itsourcecode-constr-d97f737e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5823%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d6e9e31cc7ad14dac41f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5815-stack-based-buffer-overflow-in-d-lin-6637b7b7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5815%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-645&amp;severity=high&amp;id=69d6e6551cc7ad14dac1d68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5814-sql-injection-in-phpgurukul-online-c-86739237</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5814%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=69d6e6551cc7ad14dac1d687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5813-sql-injection-in-phpgurukul-online-c-05695093</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5813%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=69d6df4b1cc7ad14dabe8749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5812-business-logic-errors-in-sourcecodes-bdf698b9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5812%3A%20Business%20Logic%20Errors%20in%20SourceCodester%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69d6dbd71cc7ad14dabd4729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3199-cwe-502-deserialization-of-untrusted-067114aa</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3199%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Sonatype%20Nexus%20Repository&amp;severity=critical&amp;id=69d6d8431cc7ad14dabb05cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3438-cwe-79-improper-neutralization-of-in-86971f0a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3438%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=69d6d8431cc7ad14dabb05d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5811-business-logic-errors-in-sourcecodes-5f8fd1d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5811%3A%20Business%20Logic%20Errors%20in%20SourceCodester%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69d6d8431cc7ad14dabb05d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5810-cross-site-scripting-in-sourcecodest-fc4b6522</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5810%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69d6d13b1cc7ad14dab766c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40036-cwe-770-allocation-of-resources-wit-a6778d4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40036%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20obsidianforensics%20unfurl&amp;severity=high&amp;id=69d6d13b1cc7ad14dab766cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40035-cwe-489-active-debug-code-in-obsidi-883d1265</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40035%3A%20CWE-489%20Active%20Debug%20Code%20in%20obsidianforensics%20unfurl&amp;severity=critical&amp;id=69d6d13b1cc7ad14dab766cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40032-improper-neutralization-of-special--b7859277</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40032%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20tclahr%20UAC&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40031-cwe-427-uncontrolled-search-path-el-86bb5af2</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40031%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20ufrisk%20MemProcFS&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bfa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40030-improper-neutralization-of-special--e7e4c480</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40030%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20khyrenz%20parseusbs&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40029-improper-neutralization-of-special--af174d66</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40029%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20khyrenz%20parseusbs&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40028-cwe-79-improper-neutralization-of-i-f38ecff8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40028%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yamato-Security%20hayabusa&amp;severity=medium&amp;id=69d6cdb91cc7ad14dab5bf98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40027-cwe-22-improper-limitation-of-a-pat-c5e77607</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40027%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20abrignoni%20ALEAPP&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5808-cross-site-scripting-in-openstatushq-f958f2cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5808%3A%20Cross%20Site%20Scripting%20in%20openstatusHQ%20openstatus&amp;severity=medium&amp;id=69d6cdb91cc7ad14dab5bfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5711-cwe-79-improper-neutralization-of-in-b0a1f1ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pubudu-malalasekara%20Post%20Blocks%20%26%20Tools&amp;severity=medium&amp;id=69d6cdb91cc7ad14dab5bfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5919-insufficient-validation-of-untrusted-cc335c74</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5919%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca441cc7ad14dab3ce63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5918-inappropriate-implementation-in-goog-85bbee64</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5918%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca421cc7ad14dab3ce0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5915-insufficient-validation-of-untrusted-40ff480c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5915%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3ce06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5914-type-confusion-in-google-chrome-d064b24a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5914%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3ce02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5913-out-of-bounds-read-in-google-chrome-4fd648ea</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5913%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5912-integer-overflow-in-google-chrome-73decb5a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5912%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5911-policy-bypass-in-google-chrome-bc41f8ef</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5911%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca421cc7ad14dab3cdf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5910-integer-overflow-in-google-chrome-bb2b2b54</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5910%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5909-integer-overflow-in-google-chrome-9cd1c959</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5909%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5908-integer-overflow-in-google-chrome-8af47645</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5908%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5907-insufficient-data-validation-in-goog-b8535f82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5907%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5906-incorrect-security-ui-in-google-chro-e55741d0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5906%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cdb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5905-incorrect-security-ui-in-google-chro-b1cc01f1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5905%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cdb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5904-use-after-free-in-google-chrome-033227fd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5904%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca401cc7ad14dab3cdb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5903-policy-bypass-in-google-chrome-8f14a797</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5903%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5902-race-in-google-chrome-32d92464</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5902%3A%20Race%20in%20Google%20Chrome&amp;severity=critical&amp;id=69d6ca401cc7ad14dab3cda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5901-policy-bypass-in-google-chrome-0f88b312</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5901%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5900-policy-bypass-in-google-chrome-1d248127</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5900%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5899-incorrect-security-ui-in-google-chro-e7632c22</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5899%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5898-incorrect-security-ui-in-google-chro-1ea6a19c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5898%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5897-incorrect-security-ui-in-google-chro-f3fa91bb</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5897%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5896-policy-bypass-in-google-chrome-4a875369</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5896%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5895-incorrect-security-ui-in-google-chro-be6e597f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5895%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5894-inappropriate-implementation-in-goog-2c81a6bf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5894%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5893-race-in-google-chrome-5ddb3cf9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5893%3A%20Race%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5892-insufficient-policy-enforcement-in-g-cb6c6b8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5892%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5891-insufficient-policy-enforcement-in-g-db71c088</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5891%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5890-race-in-google-chrome-cc385d34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5890%3A%20Race%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5889-cryptographic-flaw-in-google-chrome-df3ad6e9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5889%3A%20Cryptographic%20Flaw%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5888-uninitialized-use-in-google-chrome-b2563f01</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5888%3A%20Uninitialized%20Use%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5887-insufficient-validation-of-untrusted-d67fafeb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5887%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5886-out-of-bounds-read-in-google-chrome-7ca4d0af</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5886%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5885-insufficient-validation-of-untrusted-4ffcbeb2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5885%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5884-insufficient-validation-of-untrusted-119bb8eb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5884%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca3b1cc7ad14dab3cc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5883-use-after-free-in-google-chrome-adf1ec4a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5883%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5882-incorrect-security-ui-in-google-chro-700d0342</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5882%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5881-policy-bypass-in-google-chrome-e00814a7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5881%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5880-incorrect-security-ui-in-google-chro-862c68eb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5880%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5879-insufficient-validation-of-untrusted-bf0ed693</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5879%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca3b1cc7ad14dab3cc5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5878-incorrect-security-ui-in-google-chro-b56f6a3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5878%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5877-use-after-free-in-google-chrome-4281f5a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5877%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca3b1cc7ad14dab3cc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5876-side-channel-information-leakage-in--bf8afdaa</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5876%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5875-policy-bypass-in-google-chrome-f0e918b0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5875%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5874-use-after-free-in-google-chrome-f08fd110</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5874%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69d6ca391cc7ad14dab3cbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5873-out-of-bounds-read-and-write-in-goog-7d05a430</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5873%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5872-use-after-free-in-google-chrome-6bf1af4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5872%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5871-type-confusion-in-google-chrome-061cf3d7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5871%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5870-integer-overflow-in-google-chrome-734323c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5870%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5869-heap-buffer-overflow-in-google-chrom-e9e2c0dd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5869%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5868-heap-buffer-overflow-in-google-chrom-a7f123ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5868%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5867-heap-buffer-overflow-in-google-chrom-903da312</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5867%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5866-use-after-free-in-google-chrome-ca9dddbd</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5866%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5865-type-confusion-in-google-chrome-eaffaa1e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5865%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5864-heap-buffer-overflow-in-google-chrom-9e3c27ca</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5864%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca371cc7ad14dab3cb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5863-inappropriate-implementation-in-goog-eb628808</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5863%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5862-inappropriate-implementation-in-goog-1605f1f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5862%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5861-use-after-free-in-google-chrome-92acefd5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5861%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5860-use-after-free-in-google-chrome-4fcd253c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5860%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5859-integer-overflow-in-google-chrome-baee9cba</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5859%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5858-heap-buffer-overflow-in-google-chrom-15930810</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5858%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5806-cross-site-scripting-in-code-project-8a977b91</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5806%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69d6ca371cc7ad14dab3cb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39860-cwe-61-unix-symbolic-link-symlink-f-8f2fa90c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39860%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20NixOS%20nix&amp;severity=critical&amp;id=69d6c32c1cc7ad14dab1ab39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39892-cwe-119-improper-restriction-of-ope-5b8d3307</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39892%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20pyca%20cryptography&amp;severity=medium&amp;id=69d6c32c1cc7ad14dab1ab4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39891-cwe-94-improper-control-of-generati-8cf06461</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39891%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d6c32c1cc7ad14dab1ab4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39890-cwe-502-deserialization-of-untruste-f407d865</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39890%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d6c32c1cc7ad14dab1ab47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39889-cwe-200-exposure-of-sensitive-infor-5cac7484</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39889%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d6c32c1cc7ad14dab1ab44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39888-cwe-657-violation-of-secure-design--053285e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39888%3A%20CWE-657%3A%20Violation%20of%20Secure%20Design%20Principles%20in%20MervinPraison%20praisonaiagents&amp;severity=critical&amp;id=69d6c32c1cc7ad14dab1ab41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39885-cwe-918-server-side-request-forgery-b0b6ba4a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39885%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20agentfront%20frontmcp&amp;severity=high&amp;id=69d6bfa81cc7ad14dab01ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5805-sql-injection-in-code-projects-easy--cac7f445</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5805%3A%20SQL%20Injection%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69d6bfa81cc7ad14dab01ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39883-cwe-426-untrusted-search-path-in-op-4a3a460e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39883%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20open-telemetry%20opentelemetry-go&amp;severity=high&amp;id=69d6bfa81cc7ad14dab01abc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5436-cwe-22-improper-limitation-of-a-path-ba455af8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5436%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20inc2734%20MW%20WP%20Form&amp;severity=high&amp;id=69d6bfa81cc7ad14dab01ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5451-cwe-79-improper-neutralization-of-in-9369247d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20Extensions%20for%20Leaflet%20Map&amp;severity=medium&amp;id=69d6bfa81cc7ad14dab01acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39882-cwe-789-memory-allocation-with-exce-341c852d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39882%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-go&amp;severity=medium&amp;id=69d6bfa81cc7ad14dab01ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39429-cwe-862-missing-authorization-in-kc-6a375916</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39429%3A%20CWE-862%3A%20Missing%20Authorization%20in%20kcp-dev%20kcp&amp;severity=high&amp;id=69d6bc281cc7ad14daadeade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5803-server-side-request-forgery-in-bigsk-0808d0e3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5803%3A%20Server-Side%20Request%20Forgery%20in%20bigsk1%20openai-realtime-ui&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39844-cwe-22-improper-limitation-of-a-pat-2aa72956</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39844%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39416-cwe-79-improper-neutralization-of-i-710941ba</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39416%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ail-project%20ail-framework&amp;severity=high&amp;id=69d6bc281cc7ad14daadeada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39415-cwe-602-client-side-enforcement-of--aa92afa9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39415%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20frappe%20lms&amp;severity=medium&amp;id=69d6bc281cc7ad14daadead7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39880-cwe-362-concurrent-execution-using--486d98d7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39880%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20remnawave%20backend&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5802-os-command-injection-in-idachev-mcp--44929899</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5802%3A%20OS%20Command%20Injection%20in%20idachev%20mcp-javadc&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39862-cwe-78-improper-neutralization-of-s-e1fd5309</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39862%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shopify%20tophat&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39859-cwe-22-improper-limitation-of-a-pat-eb4e4019</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39859%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20harttle%20liquidjs&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39413-cwe-347-improper-verification-of-cr-65040a13</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39413%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20HKUDS%20LightRAG&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39412-cwe-200-exposure-of-sensitive-infor-c828575b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39412%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20harttle%20liquidjs&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35525-cwe-61-unix-symbolic-link-symlink-f-c78ff532</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35525%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23869-cwe-502-deserialization-of-untruste-56f5fbec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23869%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data%2C%20(CWE-400)%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-turbopack&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canis-c2-exposed-previously-undocumented-cross-pla-e1c0317e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canis%20C2%20Exposed%3A%20Previously%20Undocumented%20Cross-Platform%20...&amp;severity=medium&amp;id=69d7e6f61cc7ad14dafe7e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35455-cwe-79-improper-neutralization-of-i-573d1665</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35455%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20immich-app%20immich&amp;severity=high&amp;id=69d736f91cc7ad14da418a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35446-cwe-552-files-or-directories-access-9eb009af</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35446%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20aces%20Loris&amp;severity=high&amp;id=69d6bc281cc7ad14daadeafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35403-cwe-79-improper-neutralization-of-i-664839e9</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35403%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aces%20Loris&amp;severity=medium&amp;id=69d736f91cc7ad14da418a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35400-cwe-59-improper-link-resolution-bef-9bad991e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35400%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20aces%20Loris&amp;severity=low&amp;id=69d6b51c1cc7ad14daaa5cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35169-cwe-79-improper-neutralization-of-i-2c58241a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35169%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=69d736f91cc7ad14da418a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35165-cwe-639-authorization-bypass-throug-77a552ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35165%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aces%20Loris&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34985-cwe-639-authorization-bypass-throug-b3f6cc2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34985%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aces%20Loris&amp;severity=medium&amp;id=69d736f91cc7ad14da418a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20709-escalation-of-privilege-in-intelr-p-4405e30a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20709%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Pentium(R)%20Processor%20Silver%20Series%2C%20Intel(R)%20Celeron(R)%20Processor%20J%20Series%2C%20Intel(R)%20Celeron(R)%20Processor%20N%20Series%20may%20allow%20an%20escalation%20of%20privilege.%20Hardware%20reverse%20engineer%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20physical%20access%20when%20attack%20requirements%20are%20present%20with%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(none)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34392-cwe-552-files-or-directories-access-3dcf7cce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34392%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20aces%20Loris&amp;severity=high&amp;id=69d736fd1cc7ad14da418ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30818-cwe-78-improper-neutralization-of-s-1f2ec8c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30818%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30817-cwe-15-external-control-of-system-o-7377e4ef</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30817%3A%20CWE-15%20External%20control%20of%20system%20or%20configuration%20setting%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30816-cwe-15-external-control-of-system-o-ad8808da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30816%3A%20CWE-15%20External%20control%20of%20system%20or%20configuration%20setting%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30815-cwe-78-improper-neutralization-of-s-e64f09b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30815%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34166-cwe-400-uncontrolled-resource-consu-597ecf56</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34166%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20harttle%20liquidjs&amp;severity=low&amp;id=69d736fd1cc7ad14da418acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30814-cwe-121-stack-based-buffer-overflow-55b44b4e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30814%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33350-cwe-89-improper-neutralization-of-s-91697de3</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33350%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27806-cwe-78-improper-neutralization-of-s-ba7f9fe1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27806%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=high&amp;id=69d736fb1cc7ad14da418a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30650-cwe-306-missing-authentication-for--762e46b9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30650%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0811-cwe-352-cross-site-request-forgery-c-3f34647d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0811%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vsourz1td%20Advanced%20Contact%20form%207%20DB&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0814-cwe-862-missing-authorization-in-vso-88777e5a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0814%3A%20CWE-862%20Missing%20Authorization%20in%20vsourz1td%20Advanced%20Contact%20form%207%20DB&amp;severity=medium&amp;id=69d736fb1cc7ad14da418a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2942-cwe-434-unrestricted-upload-of-file--b7e9cbd0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2942%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20prosolution%20ProSolution%20WP%20Client&amp;severity=critical&amp;id=69d6b1991cc7ad14daa7cbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-007-cisco-sou-1add4738</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20007%20-%20Cisco%20Source%20Code%20Stolen%20via%20Trivy-Linked%20Breach%2C%20Google%20GTIG%20Tracks%20TeamPCP%20as%20UNC6780%2C%20and%20CISA%20KEV%20Deadline%20Arrives%20with%20No%20Standalone%20Advisory%2C%20(Wed%2C%20Apr%208th)&amp;severity=medium&amp;id=69d68e701cc7ad14da93c4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32591-server-side-request-forgery-ssrf-in-522c3953</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32591%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69d737011cc7ad14da419497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32590-deserialization-of-untrusted-data-i-2ac51227</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32590%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32589-authorization-bypass-through-user-c-a7beb159</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32589%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=high&amp;id=69d736fd1cc7ad14da418ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33466-cwe-22-improper-limitation-of-a-pat-c3f5e5cb</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33466%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Elastic%20Logstash&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33458-cwe-918-server-side-request-forgery-637efd36</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33458%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69d6b19c1cc7ad14daa7cc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33459-cwe-400-uncontrolled-resource-consu-70fe4680</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33459%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69d737031cc7ad14da4194b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33460-cwe-863-incorrect-authorization-in--22d07900</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33460%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69d737031cc7ad14da4194d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14243-generation-of-error-message-contain-a37e8c0f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14243%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33461-cwe-863-incorrect-authorization-in--fa848cf6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33461%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69d737031cc7ad14da4194db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4498-cwe-250-execution-with-unnecessary-p-df770b45</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4498%3A%20CWE-250%20%20Execution%20with%20Unnecessary%20Privileges%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69d737031cc7ad14da4194de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2377-server-side-request-forgery-ssrf-in--81c7f9e6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2377%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69d6aa921cc7ad14daa3e922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4837-cwe-95-improper-neutralization-of-di-59dba1b6</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4837%3A%20CWE-95%20Improper%20neutralization%20of%20directives%20in%20dynamically%20evaluated%20code%20(&apos;eval%20injection&apos;)%20in%20Rapid7%20Insight%20Agent&amp;severity=medium&amp;id=69d729211cc7ad14da1b339d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-leakage-vulnerability-patched-in-openssl-53eed26d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Leakage%20Vulnerability%20Patched%20in%20OpenSSL&amp;severity=medium&amp;id=69d679581cc7ad14da88dc9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33753-cwe-295-improper-certificate-valida-6c184a01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33753%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20trailofbits%20rfc3161-client&amp;severity=medium&amp;id=69d672521cc7ad14da85d64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33229-cwe-862-missing-authorization-in-xw-2e4740d9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33229%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=69d672521cc7ad14da85d649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-malware-uses-macos-script-editor-to-deliv-7a29e1d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Malware%20Uses%20macOS%20Script%20Editor%20to%20Deliver%20Atomic%20Stealer&amp;severity=medium&amp;id=69d6805e1cc7ad14da8bd0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39410-cwe-20-improper-input-validation-in-1020d1d4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39410%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20honojs%20hono&amp;severity=medium&amp;id=69d672521cc7ad14da85d658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39409-cwe-180-incorrect-behavior-order-va-1414983d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39409%3A%20CWE-180%3A%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20honojs%20hono&amp;severity=medium&amp;id=69d737041cc7ad14da419536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39408-cwe-22-improper-limitation-of-a-pat-66010df7</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39408%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=69d737061cc7ad14da419553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39407-cwe-22-improper-limitation-of-a-pat-eda2389a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39407%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=69d737041cc7ad14da419531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39406-cwe-22-improper-limitation-of-a-pat-011619d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39406%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20node-server&amp;severity=medium&amp;id=69d672521cc7ad14da85d655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39394-cwe-93-improper-neutralization-of-c-77c1a2a2</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39394%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69d737041cc7ad14da41952e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39393-cwe-306-missing-authentication-for--2ef30390</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39393%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69d737041cc7ad14da41953e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39392-cwe-79-improper-neutralization-of-i-2a311013</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39392%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d737041cc7ad14da41952b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-bug-lurked-in-apache-activemq-classic-for-13-y-def0a809</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20Bug%20Lurked%20in%20Apache%20ActiveMQ%20Classic%20for%2013%20Years&amp;severity=medium&amp;id=69d667c41cc7ad14da7efa7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39391-cwe-79-improper-neutralization-of-i-6c691515</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39391%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d672521cc7ad14da85d652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39390-cwe-79-improper-neutralization-of-i-3ca1c395</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39390%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d737041cc7ad14da419528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39389-cwe-285-improper-authorization-in-c-861cb544</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39389%3A%20CWE-285%3A%20Improper%20Authorization%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d737041cc7ad14da41953b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/more-honeypot-fingerprinting-scans-wed-apr-8th-8f55a218</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=More%20Honeypot%20Fingerprinting%20Scans%2C%20(Wed%2C%20Apr%208th)&amp;severity=medium&amp;id=69d667d01cc7ad14da7efc4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58713-incorrect-default-permissions-in-re-e2dea4de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58713%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Process%20Automation%207&amp;severity=medium&amp;id=69d664421cc7ad14da7c09be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57853-incorrect-default-permissions-in-re-598e8725</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57853%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Web%20Terminal&amp;severity=medium&amp;id=69d664421cc7ad14da7c09b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57854-incorrect-default-permissions-in-re-a8e4f541</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57854%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Update%20Service&amp;severity=medium&amp;id=69d664421cc7ad14da7c09ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57851-incorrect-default-permissions-in-re-4a9ea030</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57851%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Multicluster%20Engine%20for%20Kubernetes&amp;severity=medium&amp;id=69d664421cc7ad14da7c09b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57847-incorrect-default-permissions-in-re-2124732f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57847%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=medium&amp;id=69d664421cc7ad14da7c09ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-lua-based-malware-lucidrook-observed-in-target-41a1408d</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Lua-based%20malware%20LucidRook%20observed%20in%20targeted%20attacks%20against%20Taiwanese%20organizations&amp;severity=medium&amp;id=69d683e41cc7ad14da8df5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-cybercrime-losses-neared-21-billion-in-2025-aee29786</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20Cybercrime%20Losses%20Neared%20%2421%20Billion%20in%202025&amp;severity=high&amp;id=69d659b41cc7ad14da6ff066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5795-cwe-226-sensitive-information-in-res-9bb8041f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5795%3A%20CWE-226%20Sensitive%20information%20in%20resource%20not%20removed%20before%20reuse%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=69d729211cc7ad14da1b33a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2509-cwe-79-improper-neutralization-of-in-d2f401e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2509%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=69d737031cc7ad14da4194b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14816-cwe-317-cleartext-storage-of-sensit-e3c6f53b</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14816%3A%20CWE-317%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20GUI%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=critical&amp;id=69d737041cc7ad14da419523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14815-cwe-312-cleartext-storage-of-sensit-1111c12c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14815%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=critical&amp;id=69d737041cc7ad14da41951e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35023-cwe-639-authorization-bypass-throug-032ebf5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35023%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cloud%20Solutions%20SAS%20Wimi%20Teamwork&amp;severity=medium&amp;id=69d737061cc7ad14da419558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28261-cwe-532-insertion-of-sensitive-info-3383cc31</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28261%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20Elastic%20Cloud%20Storage&amp;severity=high&amp;id=69d652ab1cc7ad14da6cf237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massachusetts-hospital-diverts-ambulances-as-cyber-a4d8f793</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massachusetts%20Hospital%20Diverts%20Ambulances%20as%20Cyberattack%20Causes%20Disruption&amp;severity=medium&amp;id=69d64ba31cc7ad14da6b63d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24511-cwe-209-generation-of-error-message-464099fe</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24511%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27102-cwe-266-incorrect-privilege-assignm-09eee350</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27102%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5302-cwe-942-permissive-cross-domain-poli-0fe04074</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5302%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20CoolerControl%20coolercontrold&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5300-cwe-306-missing-authentication-for-c-24cdf83c</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5300%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20CoolerControl%20coolercontrold&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5301-cwe-79-improper-neutralization-of-in-aa6dc7fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5301%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoolerControl%20coolercontrol-ui&amp;severity=high&amp;id=69d64bc31cc7ad14da6b6b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-masjesu-ddos-botnet-targets-iot-devices-aef686d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20Masjesu%20DDoS%20Botnet%20Targets%20IoT%20Devices&amp;severity=critical&amp;id=69d641171cc7ad14da6710d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5208-cwe-78-improper-neutralization-of-sp-43d0d794</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CoolerControl%20coolercontrold&amp;severity=high&amp;id=69d641201cc7ad14da672288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28264-cwe-732-incorrect-permission-assign-c77bd300</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28264%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20PowerProtect%20Agent&amp;severity=low&amp;id=69d641201cc7ad14da672271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-targeting-critical-ninja-forms-bug-that-ex-4a20e46c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Targeting%20Critical%20Ninja%20Forms%20Bug%20That%20Exposes%20WordPress%20Sites%20to%20Takeover&amp;severity=critical&amp;id=69d63a0f1cc7ad14da63b20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3396-cwe-89-improper-neutralization-of-sp-b4d531e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3396%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shamimmoeen%20WCAPF%20%E2%80%93%20Ajax%20Product%20Filter%20for%20WooCommerce&amp;severity=high&amp;id=69d641201cc7ad14da672280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1672-cwe-352-cross-site-request-forgery-c-20c6ab40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1672%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20realmag777%20BEAR%20%E2%80%93%20Bulk%20Editor%20and%20Products%20Manager%20Professional%20for%20WooCommerce%20by%20Pluginus.Net&amp;severity=medium&amp;id=69d641201cc7ad14da672260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2481-cwe-79-improper-neutralization-of-in-74882230</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2481%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=69d641201cc7ad14da672274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3243-cwe-22-improper-limitation-of-a-path-47ffd1ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3243%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danbilabs%20Advanced%20Members%20for%20ACF&amp;severity=high&amp;id=69d641201cc7ad14da672278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1673-cwe-352-cross-site-request-forgery-c-e5802127</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1673%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20realmag777%20BEAR%20%E2%80%93%20Bulk%20Editor%20and%20Products%20Manager%20Professional%20for%20WooCommerce%20by%20Pluginus.Net&amp;severity=medium&amp;id=69d641201cc7ad14da672267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1865-cwe-89-improper-neutralization-of-sp-26abc5f4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1865%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69d641201cc7ad14da67226d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-disrupts-russian-espionage-operation-involving--40648239</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Disrupts%20Russian%20Espionage%20Operation%20Involving%20Hacked%20Routers%20and%20DNS%20Hijacking&amp;severity=medium&amp;id=69d6368b1cc7ad14da6116ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4300-cwe-79-improper-neutralization-of-in-28f97e93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4300%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Robo%20Gallery%20%E2%80%93%20Photo%20%26%20Image%20Slider&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fceb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4025-cwe-79-improper-neutralization-of-in-595e52c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4025%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lcweb-projects%20PrivateContent%20Free&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fce9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4303-cwe-79-improper-neutralization-of-in-668fbda1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osamaesh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fcec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4073-cwe-79-improper-neutralization-of-in-d7e9452f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dougblackjr%20pdfl.io&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fcea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-contagious-interview-campaign-spreads-dab88f6f</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea&apos;s%20Contagious%20Interview%20Campaign%20Spreads%20Across%205%20Ecosystems%2C%20Delivering%20Staged%20RAT%20Payloads&amp;severity=medium&amp;id=69d636951cc7ad14da612c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-64-bit-variant-of-the-infamous-lumma-f87ffc8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20The%2064-bit%20Variant%20of%20the%20Infamous%20Lumma%20Stealer&amp;severity=medium&amp;id=69d636951cc7ad14da612c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leveling-up-with-nightspire-ransomware-15a6d07c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leveling%20Up%20with%20NightSpire%20Ransomware&amp;severity=medium&amp;id=69d636951cc7ad14da612c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25776-code-injection-in-six-apart-ltd-mov-c0a38b7e</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25776%3A%20Code%20injection%20in%20Six%20Apart%20Ltd.%20Movable%20Type&amp;severity=critical&amp;id=69d61a8c1cc7ad14da4e089b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33088-improper-neutralization-of-special--986381b5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33088%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20Six%20Apart%20Ltd.%20Movable%20Type&amp;severity=high&amp;id=69d61a8c1cc7ad14da4e08a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39716-missing-authorization-in-ckthemes-f-5bb90c60</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39716%3A%20Missing%20Authorization%20in%20CKThemes%20Flipmart&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b0108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39715-missing-authorization-in-anytrack-a-c8c688ed</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39715%3A%20Missing%20Authorization%20in%20AnyTrack%20AnyTrack%20Affiliate%20Link%20Manager&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b0105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39714-missing-authorization-in-g5theme-g5-7e202b33</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39714%3A%20Missing%20Authorization%20in%20G5Theme%20G5Plus%20April&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b0102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39713-missing-authorization-in-mailerclou-885e1e12</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39713%3A%20Missing%20Authorization%20in%20mailercloud%20Mailercloud%20%E2%80%93%20Integrate%20webforms%20and%20synchronize%20website%20contacts&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39712-improper-neutralization-of-script-r-e77d5193</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39712%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39711-insertion-of-sensitive-information--6fd7de96</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39711%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20stmcan%20RT-Theme%2018%20%7C%20Extensions&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39710-cross-site-request-forgery-csrf-in--ffdaf480</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39710%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stmcan%20RT-Theme%2018%20%7C%20Extensions&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39709-insertion-of-sensitive-information--07f770e8</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39709%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20thetechtribe%20The%20Tribal&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39708-improper-neutralization-of-input-du-37293b52</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39708%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uicore%20UiCore%20Elements&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39707-missing-authorization-in-zealousweb-1c0f1e09</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39707%3A%20Missing%20Authorization%20in%20ZealousWeb%20Accept%20PayPal%20Payments%20using%20Contact%20Form%207&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b00a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39706-missing-authorization-in-netro-syst-76ad30c4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39706%3A%20Missing%20Authorization%20in%20Netro%20Systems%20Make%20My%20Trivia&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b00a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39705-missing-authorization-in-mulika-tea-3f637445</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39705%3A%20Missing%20Authorization%20in%20Mulika%20Team%20MIPL%20WC%20Multisite%20Sync&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b009d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39704-missing-authorization-in-nfusionsol-461a37b3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39704%3A%20Missing%20Authorization%20in%20nfusionsolutions%20Precious%20Metals%20Automated%20Product%20Pricing%20%E2%80%93%20Pro&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b009a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39703-improper-neutralization-of-input-du-4f8d1788</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39703%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39702-improper-neutralization-of-input-du-605f6758</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39702%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wealcoder%20Animation%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39701-missing-authorization-in-andrew-sho-2a1a28f9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39701%3A%20Missing%20Authorization%20in%20Andrew%20ShopWP&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39700-missing-authorization-in-wpxpo-wowo-434bf2b0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39700%3A%20Missing%20Authorization%20in%20WPXPO%20WowOptin&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b008e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39699-missing-authorization-in-massiveshi-21bf615b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39699%3A%20Missing%20Authorization%20in%20massiveshift%20AI%20Workflow%20Automation&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b008b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39698-missing-authorization-in-publisherd-f1b61006</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39698%3A%20Missing%20Authorization%20in%20PublisherDesk%20The%20Publisher%20Desk%20ads.txt&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39697-missing-authorization-in-hbss-techn-f0e981c9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39697%3A%20Missing%20Authorization%20in%20HBSS%20Technologies%20MAIO%20%E2%80%93%20The%20new%20AI%20GEO%20%2F%20SEO%20tool&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39696-improper-neutralization-of-input-du-69c8831b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39696%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elfsight%20Elfsight%20WhatsApp%20Chat%20CC&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39694-missing-authorization-in-nsquared-s-37b8eff3</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39694%3A%20Missing%20Authorization%20in%20NSquared%20Simply%20Schedule%20Appointments&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39693-improper-neutralization-of-input-du-a9c9bdc1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39693%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fesomia%20FSM%20Custom%20Featured%20Image%20Caption&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39692-improper-neutralization-of-input-du-830a178a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39692%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b003d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39691-missing-authorization-in-adastracry-96af4a1b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39691%3A%20Missing%20Authorization%20in%20AdAstraCrypto%20Cryptocurrency%20Donation%20Box%20%E2%80%93%20Bitcoin%20%26%20Crypto%20Donations&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b003a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39690-missing-authorization-in-paul-bearn-915d2868</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39690%3A%20Missing%20Authorization%20in%20Paul%20Bearne%20Author%20Avatars%20List%2FBlock&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39689-missing-authorization-in-eshipper-e-5e8bc15c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39689%3A%20Missing%20Authorization%20in%20eshipper%20eShipper%20Commerce&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39688-missing-authorization-in-glowlogix--4d7f1971</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39688%3A%20Missing%20Authorization%20in%20Glowlogix%20WP%20Frontend%20Profile&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39687-missing-authorization-in-rapid-car--54457d5d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39687%3A%20Missing%20Authorization%20in%20Rapid%20Car%20Check%20Rapid%20Car%20Check%20Vehicle%20Data&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b002e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39686-exposure-of-sensitive-system-inform-a60b3975</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39686%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20bannersky%20BSK%20PDF%20Manager&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39685-missing-authorization-in-lvaudore-t-dfcb5c55</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39685%3A%20Missing%20Authorization%20in%20lvaudore%20The%20Moneytizer&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39684-improper-control-of-filename-for-in-ef8b4fbf</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39684%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20UnTheme%20OrganicFood&amp;severity=high&amp;id=69d6170a1cc7ad14da4affe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39683-improper-neutralization-of-input-du-e59c4297</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chief%20Gnome%20Garden%20Gnome%20Package&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39682-missing-authorization-in-arjan-pron-4a6b3907</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39682%3A%20Missing%20Authorization%20in%20Arjan%20Pronk%20linkPizza-Manager&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39681-improper-control-of-filename-for-in-1690a4a9</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39681%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Homeo&amp;severity=high&amp;id=69d6170a1cc7ad14da4affd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39680-missing-authorization-in-mwp-develo-0cd2af4d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39680%3A%20Missing%20Authorization%20in%20MWP%20Development%20Diet%20Calorie%20Calculator&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39679-improper-control-of-filename-for-in-427ce365</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39679%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Freeio&amp;severity=high&amp;id=69d6170a1cc7ad14da4affd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39678-missing-authorization-in-dotonpaper-6bffaa78</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39678%3A%20Missing%20Authorization%20in%20DOTonPAPER%20Pinpoint%20Booking%20System&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39677-improper-control-of-filename-for-in-d312e518</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39677%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Emphires&amp;severity=high&amp;id=69d6170a1cc7ad14da4affcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39676-missing-authorization-in-shahjada-d-f847ca3a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39676%3A%20Missing%20Authorization%20in%20Shahjada%20Download%20Manager&amp;severity=medium&amp;id=69d617091cc7ad14da4aff70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39675-missing-authorization-in-webmuehle--de1f4d2c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39675%3A%20Missing%20Authorization%20in%20webmuehle%20Court%20Reservation&amp;severity=medium&amp;id=69d617091cc7ad14da4aff6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39674-improper-neutralization-of-input-du-f256b351</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Manoj%20Kumar%20MK%20Google%20Directions&amp;severity=medium&amp;id=69d617091cc7ad14da4aff6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39673-missing-authorization-in-shrikantka-a43e6ac7</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39673%3A%20Missing%20Authorization%20in%20shrikantkale%20iZooto&amp;severity=medium&amp;id=69d617091cc7ad14da4aff67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39672-missing-authorization-in-shiptime-s-c1df82e0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39672%3A%20Missing%20Authorization%20in%20shiptime%20ShipTime%3A%20Discounted%20Shipping%20Rates&amp;severity=medium&amp;id=69d617091cc7ad14da4aff64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39671-cross-site-request-forgery-csrf-in--cfec4007</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39671%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dotstore%20Extra%20Fees%20Plugin%20for%20WooCommerce&amp;severity=high&amp;id=69d617091cc7ad14da4aff61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39670-server-side-request-forgery-ssrf-in-9775c543</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39670%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Brecht%20Visual%20Link%20Preview&amp;severity=medium&amp;id=69d617091cc7ad14da4aff5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39668-missing-authorization-in-g5theme-bo-cf8964bc</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39668%3A%20Missing%20Authorization%20in%20g5theme%20Book%20Previewer%20for%20Woocommerce&amp;severity=medium&amp;id=69d617091cc7ad14da4aff5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39667-improper-neutralization-of-input-du-2d48dce4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39667%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jongmyoung%20Kim%20Korea%20SNS&amp;severity=medium&amp;id=69d617091cc7ad14da4aff58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39666-improper-neutralization-of-input-du-87b4cf8d</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39666%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20telepathy%20Hello%20Bar%20Popup%20Builder&amp;severity=medium&amp;id=69d617091cc7ad14da4aff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39665-improper-neutralization-of-input-du-8c22e649</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39665%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vladimir%20Prelovac%20SEO%20Friendly%20Images&amp;severity=medium&amp;id=69d617071cc7ad14da4aff48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39663-missing-authorization-in-themetechm-be395ba6</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39663%3A%20Missing%20Authorization%20in%20themetechmount%20TrueBooker&amp;severity=medium&amp;id=69d617071cc7ad14da4aff45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39662-missing-authorization-in-prowcplugi-bc63743f</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39662%3A%20Missing%20Authorization%20in%20ProWCPlugins%20Product%20Price%20by%20Formula%20for%20WooCommerce&amp;severity=medium&amp;id=69d617071cc7ad14da4aff42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39660-missing-authorization-in-automattic-d4520bba</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39660&amp;severity=null&amp;id=69d617071cc7ad14da4aff3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39659-aa1d911c</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39659&amp;severity=null&amp;id=69e75c8219fe3cd2cdc91b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39658-missing-authorization-in-coding-pan-6a730078</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39658%3A%20Missing%20Authorization%20in%20Coding%20Panda%20Panda%20Pods%20Repeater%20Field&amp;severity=medium&amp;id=69d617071cc7ad14da4aff3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39657-missing-authorization-in-leadlovers-d6a0a48b</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39657%3A%20Missing%20Authorization%20in%20leadlovers%20leadlovers%20forms&amp;severity=medium&amp;id=69d617071cc7ad14da4aff39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39656-missing-authorization-in-razorpay-r-7b8f408a</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39656%3A%20Missing%20Authorization%20in%20Razorpay%20Razorpay%20for%20WooCommerce&amp;severity=medium&amp;id=69d617071cc7ad14da4aff36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39654-improper-neutralization-of-input-du-8e014536</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39654%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashish%20Ajani%20WP%20Simple%20HTML%20Sitemap&amp;severity=medium&amp;id=69d617071cc7ad14da4aff33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39653-missing-authorization-in-deepen-baj-12aea5fd</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39653%3A%20Missing%20Authorization%20in%20Deepen%20Bajracharya%20Video%20Conferencing%20with%20Zoom&amp;severity=medium&amp;id=69d617071cc7ad14da4aff30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39652-missing-authorization-in-igms-igms--5296a529</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39652%3A%20Missing%20Authorization%20in%20igms%20iGMS%20Direct%20Booking&amp;severity=medium&amp;id=69d617071cc7ad14da4aff2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39651-missing-authorization-in-totalsuite-944d0008</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39651%3A%20Missing%20Authorization%20in%20TotalSuite%20Total%20Poll%20Lite&amp;severity=medium&amp;id=69d617051cc7ad14da4afefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39650-missing-authorization-in-unitech-we-6e818b77</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39650%3A%20Missing%20Authorization%20in%20Unitech%20Web%20UnitechPay&amp;severity=medium&amp;id=69d617051cc7ad14da4afefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39649-missing-authorization-in-themebeez--ce475639</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39649%3A%20Missing%20Authorization%20in%20themebeez%20Royale%20News&amp;severity=medium&amp;id=69d617051cc7ad14da4afef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39648-missing-authorization-in-themebeez--b3361ed4</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39648%3A%20Missing%20Authorization%20in%20themebeez%20Cream%20Blog&amp;severity=medium&amp;id=69d617051cc7ad14da4afef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39647-server-side-request-forgery-ssrf-in-8e42a0c1</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39647%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sonaar%20MP3%20Audio%20Player%20for%20Music%2C%20Radio%20%26%20Podcast%20by%20Sonaar&amp;severity=medium&amp;id=69d617051cc7ad14da4afef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39646-improper-neutralization-of-input-du-35cfcff0</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bozdoz%20Leaflet%20Map&amp;severity=medium&amp;id=69d617051cc7ad14da4afeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39645-server-side-request-forgery-ssrf-in-bd2c4602</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39645%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Global%20Payments%20GlobalPayments%20WooCommerce&amp;severity=medium&amp;id=69d617051cc7ad14da4afeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39644-missing-authorization-in-roxnor-wp--0ca5b0ae</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39644%3A%20Missing%20Authorization%20in%20Roxnor%20Wp%20Ultimate%20Review&amp;severity=medium&amp;id=69d617051cc7ad14da4afee9</image:loc>
    </image:image>
  </url>
</urlset>